Analysis
-
max time kernel
143s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
07-05-2023 06:56
Static task
static1
Behavioral task
behavioral1
Sample
ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe
Resource
win10v2004-20230220-en
General
-
Target
ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe
-
Size
774KB
-
MD5
7e8c77957aabd90b04285fb90a7919e9
-
SHA1
26260e7ba062f2d2e31ef1ae4d81058da9714531
-
SHA256
ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6
-
SHA512
ae3eafdf1526de62dcca2ac827e16ba63d9f9bcb9b5bde863a21c7cde4ad6dd703460a2564953e24ddf9a3a15fe1face88574708b61543cca078696d6901e098
-
SSDEEP
12288:Ay903YpaxY9FofydHEV4fIjp8O6RccW1xubYKQA2/CQjxB1f949lrP:Ay0N8pp2BarW1xuUKM/CQjMrP
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
x69754530.exem53520289.exepid process 1868 x69754530.exe 1352 m53520289.exe -
Loads dropped DLL 5 IoCs
Processes:
ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exex69754530.exem53520289.exepid process 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe 1868 x69754530.exe 1868 x69754530.exe 1868 x69754530.exe 1352 m53520289.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
x69754530.execcf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exedescription ioc process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce x69754530.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x69754530.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
m53520289.exedescription pid process Token: SeDebugPrivilege 1352 m53520289.exe -
Suspicious use of WriteProcessMemory 14 IoCs
Processes:
ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exex69754530.exedescription pid process target process PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1692 wrote to memory of 1868 1692 ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe x69754530.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe PID 1868 wrote to memory of 1352 1868 x69754530.exe m53520289.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe"C:\Users\Admin\AppData\Local\Temp\ccf46e1435a571a141e49330233bc3d5deebb0af68a78ed54d1575cb5df56be6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x69754530.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x69754530.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x69754530.exeFilesize
570KB
MD5f5abc062e4c67b8d120807691d954eb3
SHA18304ddab29cfcdac64420733033425eb71ae06c1
SHA256ec8f5493a2e616a84a3f1620b981ea9c4d5903364eb922285de0b4bdd3dbf2b9
SHA51238c4dd104c2629f548453a7e2a99c97621d859117546d7346ad0cfc76099e4f60a73c8afb0a200227999df2f3e5d0bb9dbe6c906d5f5806422e79ee87f9d082b
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x69754530.exeFilesize
570KB
MD5f5abc062e4c67b8d120807691d954eb3
SHA18304ddab29cfcdac64420733033425eb71ae06c1
SHA256ec8f5493a2e616a84a3f1620b981ea9c4d5903364eb922285de0b4bdd3dbf2b9
SHA51238c4dd104c2629f548453a7e2a99c97621d859117546d7346ad0cfc76099e4f60a73c8afb0a200227999df2f3e5d0bb9dbe6c906d5f5806422e79ee87f9d082b
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeFilesize
488KB
MD58f25b56d7b831826423384967b29bac5
SHA1c1723648eecf9c5f88eaf96d29f9ae126d9c5276
SHA256a614fb8fd9f438fb79e1066fdd2a8fcd4a1c1abe144657185dd41abba0ad2a27
SHA5121b03a0387e46c215de2615fec54b38bc0524ec94f29aba3344e692dd827766daa3db3af06bcf019a4ee3ab92e16c32294f6084e742d262ab9aaaf58f48f23766
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeFilesize
488KB
MD58f25b56d7b831826423384967b29bac5
SHA1c1723648eecf9c5f88eaf96d29f9ae126d9c5276
SHA256a614fb8fd9f438fb79e1066fdd2a8fcd4a1c1abe144657185dd41abba0ad2a27
SHA5121b03a0387e46c215de2615fec54b38bc0524ec94f29aba3344e692dd827766daa3db3af06bcf019a4ee3ab92e16c32294f6084e742d262ab9aaaf58f48f23766
-
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeFilesize
488KB
MD58f25b56d7b831826423384967b29bac5
SHA1c1723648eecf9c5f88eaf96d29f9ae126d9c5276
SHA256a614fb8fd9f438fb79e1066fdd2a8fcd4a1c1abe144657185dd41abba0ad2a27
SHA5121b03a0387e46c215de2615fec54b38bc0524ec94f29aba3344e692dd827766daa3db3af06bcf019a4ee3ab92e16c32294f6084e742d262ab9aaaf58f48f23766
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x69754530.exeFilesize
570KB
MD5f5abc062e4c67b8d120807691d954eb3
SHA18304ddab29cfcdac64420733033425eb71ae06c1
SHA256ec8f5493a2e616a84a3f1620b981ea9c4d5903364eb922285de0b4bdd3dbf2b9
SHA51238c4dd104c2629f548453a7e2a99c97621d859117546d7346ad0cfc76099e4f60a73c8afb0a200227999df2f3e5d0bb9dbe6c906d5f5806422e79ee87f9d082b
-
\Users\Admin\AppData\Local\Temp\IXP000.TMP\x69754530.exeFilesize
570KB
MD5f5abc062e4c67b8d120807691d954eb3
SHA18304ddab29cfcdac64420733033425eb71ae06c1
SHA256ec8f5493a2e616a84a3f1620b981ea9c4d5903364eb922285de0b4bdd3dbf2b9
SHA51238c4dd104c2629f548453a7e2a99c97621d859117546d7346ad0cfc76099e4f60a73c8afb0a200227999df2f3e5d0bb9dbe6c906d5f5806422e79ee87f9d082b
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeFilesize
488KB
MD58f25b56d7b831826423384967b29bac5
SHA1c1723648eecf9c5f88eaf96d29f9ae126d9c5276
SHA256a614fb8fd9f438fb79e1066fdd2a8fcd4a1c1abe144657185dd41abba0ad2a27
SHA5121b03a0387e46c215de2615fec54b38bc0524ec94f29aba3344e692dd827766daa3db3af06bcf019a4ee3ab92e16c32294f6084e742d262ab9aaaf58f48f23766
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeFilesize
488KB
MD58f25b56d7b831826423384967b29bac5
SHA1c1723648eecf9c5f88eaf96d29f9ae126d9c5276
SHA256a614fb8fd9f438fb79e1066fdd2a8fcd4a1c1abe144657185dd41abba0ad2a27
SHA5121b03a0387e46c215de2615fec54b38bc0524ec94f29aba3344e692dd827766daa3db3af06bcf019a4ee3ab92e16c32294f6084e742d262ab9aaaf58f48f23766
-
\Users\Admin\AppData\Local\Temp\IXP001.TMP\m53520289.exeFilesize
488KB
MD58f25b56d7b831826423384967b29bac5
SHA1c1723648eecf9c5f88eaf96d29f9ae126d9c5276
SHA256a614fb8fd9f438fb79e1066fdd2a8fcd4a1c1abe144657185dd41abba0ad2a27
SHA5121b03a0387e46c215de2615fec54b38bc0524ec94f29aba3344e692dd827766daa3db3af06bcf019a4ee3ab92e16c32294f6084e742d262ab9aaaf58f48f23766
-
memory/1352-85-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-99-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-80-0x0000000004EC0000-0x0000000004F00000-memory.dmpFilesize
256KB
-
memory/1352-81-0x0000000004F00000-0x0000000004F66000-memory.dmpFilesize
408KB
-
memory/1352-82-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-83-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-78-0x0000000004E30000-0x0000000004E98000-memory.dmpFilesize
416KB
-
memory/1352-87-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-89-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-91-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-93-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-95-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-97-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-79-0x0000000002250000-0x00000000022AB000-memory.dmpFilesize
364KB
-
memory/1352-101-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-103-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-109-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-107-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-105-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-113-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-111-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-115-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-119-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-117-0x0000000004F00000-0x0000000004F60000-memory.dmpFilesize
384KB
-
memory/1352-121-0x0000000000400000-0x0000000000820000-memory.dmpFilesize
4.1MB