Analysis
-
max time kernel
149s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
06-05-2023 20:44
Static task
static1
Behavioral task
behavioral1
Sample
1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe
Resource
win10v2004-20230220-en
General
-
Target
1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe
-
Size
376KB
-
MD5
ae5976d5f9b72f7051595d62d92398dc
-
SHA1
43ab360add906bc779d5e91edbaab23475182282
-
SHA256
1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80
-
SHA512
3dc417c7918d3f181b3b68d672ad8386e2dd3bf07922cd89023c0fc5850c334060b967f33a6e81085a56b70719d11235385fdd3bde785fa0d2304791dfb4950b
-
SSDEEP
6144:KBy+bnr+rp0yN90QESM4WbXtTqmrGjc//WzHxrlDiOEl4w8MlwurTc:zMr3y90EMhcmrf/+z3D6lxle
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2004 x4308908.exe 544 g9221180.exe -
Loads dropped DLL 4 IoCs
pid Process 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 2004 x4308908.exe 2004 x4308908.exe 544 g9221180.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x4308908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4308908.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 1108 wrote to memory of 2004 1108 1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe 27 PID 2004 wrote to memory of 544 2004 x4308908.exe 28 PID 2004 wrote to memory of 544 2004 x4308908.exe 28 PID 2004 wrote to memory of 544 2004 x4308908.exe 28 PID 2004 wrote to memory of 544 2004 x4308908.exe 28 PID 2004 wrote to memory of 544 2004 x4308908.exe 28 PID 2004 wrote to memory of 544 2004 x4308908.exe 28 PID 2004 wrote to memory of 544 2004 x4308908.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe"C:\Users\Admin\AppData\Local\Temp\1a87eb307b59442cc8357e10abe2bc51640c69af18c7c6c1d4271bdd519d4e80.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4308908.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\g9221180.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:544
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
204KB
MD5440b2d8c65e0500f5342e42ad93da66a
SHA14f9af29168fa8f12342629a91a2f2ad9110f5d04
SHA2566ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d
SHA512f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524
-
Filesize
204KB
MD5440b2d8c65e0500f5342e42ad93da66a
SHA14f9af29168fa8f12342629a91a2f2ad9110f5d04
SHA2566ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d
SHA512f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
204KB
MD5440b2d8c65e0500f5342e42ad93da66a
SHA14f9af29168fa8f12342629a91a2f2ad9110f5d04
SHA2566ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d
SHA512f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524
-
Filesize
204KB
MD5440b2d8c65e0500f5342e42ad93da66a
SHA14f9af29168fa8f12342629a91a2f2ad9110f5d04
SHA2566ad177b9212114cbdf3931b5f895c979e6cd64d1dd4fde6e1f9dec4f36d8db1d
SHA512f791932bca1db87a20a6062faa7b7e479343b9e9494da4deb01b5291f986f53b4fe65fd7e316bb062b44b321b7cfed90a406b769e4713b8a0bd7ad6ee86de524
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0
-
Filesize
136KB
MD58f30f7f88229560306c5959c605316de
SHA136f26a905a9743f6dd1608e39b37d1116cafcc0a
SHA2563a616b322cc7ca87e349b8ceabb92062ed0388308d1f9221e9cdb6f65c86b6f7
SHA512267d0f3954c416dc994e3c3e6790f6997598b71fdb7172e87265b31b7593fb29e9eb4cc295a38b969d1f2aa131b5a67525e0f4bb51a61a3dd82b7c63b867f9a0