Analysis
-
max time kernel
101s -
max time network
103s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2023, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
b8c98b14888f48405173bc0f44c1c98f
-
SHA1
88d9407dc689a02070693ed6f95251926ceee37d
-
SHA256
f4b15f591e0138a46f1f5fd157f31a78b360624d72a18136a5269a05ba8b987c
-
SHA512
a0a801eac10532a07d5af844db65079a06fa3c2e322260ec7407c5010f9e996aa14886e124a860d94371d2c399d7ffaba916efe1d53fa50c97f5f8023d7ea9f6
-
SSDEEP
49152:PIVMAWRywiN7AqzGKWPy3tsdWT69leSkFAaGjv616z1dUbtmFjpb3JFjGgcBL:AKo5czXmidWn1FOz6c1uQF195GLL
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1448 fgkhkbclt.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4120 1448 WerFault.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1448 fgkhkbclt.exe 1448 fgkhkbclt.exe 1448 fgkhkbclt.exe 1448 fgkhkbclt.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1808 wrote to memory of 3132 1808 file.exe 84 PID 1808 wrote to memory of 3132 1808 file.exe 84 PID 1808 wrote to memory of 3132 1808 file.exe 84 PID 3132 wrote to memory of 1448 3132 cmd.exe 86 PID 3132 wrote to memory of 1448 3132 cmd.exe 86 PID 3132 wrote to memory of 1448 3132 cmd.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Windows\SysWOW64\cmd.execmd.exe /d /c bkaetiwdh.bat 8524394182⤵
- Suspicious use of WriteProcessMemory
PID:3132 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fgkhkbclt.exefgkhkbclt.exe ldvbkwg.dat 8524394183⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1448 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 12804⤵
- Program crash
PID:4120
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1448 -ip 14481⤵PID:2344
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
132B
MD5a2923394ff80ed78dce6c6f65effb6c9
SHA1dab4961e4fda699798742c8895b562a4cc151997
SHA256cb693212c5263e428eecb1f85dcbde2a839f6b19249081eb1e5770236033692f
SHA51227223b109e5b23cab22eff452d527dbf2ade5c1d73e33c93f04b6293bee8f7f2c1fa0a298f4af3f0dad6d6866ab39a99fb860b26c0cb13d002cd994d8794e426
-
Filesize
1B
MD569691c7bdcc3ce6d5d8a1361f22d04ac
SHA1c63ae6dd4fc9f9dda66970e827d13f7c73fe841c
SHA25608f271887ce94707da822d5263bae19d5519cb3614e0daedc4c7ce5dab7473f1
SHA512253405e03b91441a6dd354a9b72e040068b1bfe10e83eb1a64a086c05525d8ccae2bf09130c624af50d55c3522a4fbb7c18cfc8dd843e5f4801d9ad2b5164b12
-
Filesize
3B
MD5158b365b9eedcfaf539f5dedfd82ee97
SHA1529f5d61ac99f60a8e473368eff1b32095a3e2bf
SHA25639561f8af034137905f14ca7fd5a2c891bc12982f3f8ef2271e75e93433ffa90
SHA512a1b231c2e6af432ee7df82e00d568819e12149af707d4c4fdd018b38cc4f9761062c5b7e497bd1b67e466b89e391520b88bf13f18c8b9ff646d82df740c05c09
-
Filesize
33B
MD5500ba63e2664798939744b8a8c9be982
SHA154743a77e4186cb327b803efb1ef5b3d4ac163ce
SHA2564ebc21177ee9907f71a1641a0482603ced98e9d43389cac0ffb0b59f7343eeba
SHA5129992b70de5867e2a00aff4f79c37ba71e827cbb104c192ebd4a553f91ae06a5b235f34e65d9d1145591c147e9e6726146cb92171945aa67b8f3294116a223fe7
-
Filesize
5.2MB
MD5a452946137958e0cee844310f9e9fa7c
SHA18cf21ae4d1d764154048a02fb49412ef94094485
SHA256088a5d04f2f6d6820bf1a6a390d9c0e00f88896c932848f0c97912b861479bb9
SHA512ef3759e134c9b0eaaf300a57d335131faa91337497f572ef7eb1058e498a071d1741a6e0947ca9e95fe92b1ca163814ce6d1d706ad5ab010d47d18038b26beaa
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
926KB
MD5eed6b04cc49440fba5a64937b0368ce4
SHA162642d22c9a47220a10e73534bc819749bd67ab9
SHA256f6d78f0a4c780374255776f80be6baf1191e706e52393fe9384e3be14ba27332
SHA5122b0b612fb4e9177ea2e930528ae461eb98058062780ee6d91ee4d93dc4a7df0c93bc6ec61f1cab059a2695851b370d568ba09440a8eeff2d70ebfb2298d6c26e