Analysis
-
max time kernel
140s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20230703-en -
resource tags
arch:x64arch:x86image:win10v2004-20230703-enlocale:en-usos:windows10-2004-x64system -
submitted
07-07-2023 00:11
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230703-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230703-en
General
-
Target
file.exe
-
Size
2.5MB
-
MD5
e714d0566d4f2645d5567067a688df72
-
SHA1
932ba86fa02efb8ea29dbcdccd6f563e507194e7
-
SHA256
7b4055eb9d72b5e5cd10c846497cb538bc366f8993198b680d195c98987d74e6
-
SHA512
f72b4a63512b4fbe3e28e8a1019e089d3b7fa8c2447365428269b9f654a441d2b9a3c9623fea83a70d4230f4203e96464e27ce549ac49a6a9c882fe9ecb7195e
-
SSDEEP
49152:qm+qTGrENf44aLip1tJDNENpVrc60dit9chZFxX/rphEfv:kENJIiplgVYPQ9wrbm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3324 fstoejyjng.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1380 3324 WerFault.exe 87 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 3324 fstoejyjng.exe 3324 fstoejyjng.exe 3324 fstoejyjng.exe 3324 fstoejyjng.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3164 wrote to memory of 2436 3164 file.exe 85 PID 3164 wrote to memory of 2436 3164 file.exe 85 PID 3164 wrote to memory of 2436 3164 file.exe 85 PID 2436 wrote to memory of 3324 2436 cmd.exe 87 PID 2436 wrote to memory of 3324 2436 cmd.exe 87 PID 2436 wrote to memory of 3324 2436 cmd.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3164 -
C:\Windows\SysWOW64\cmd.execmd.exe /d /c bghgcqrx.bat 3225193762⤵
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fstoejyjng.exefstoejyjng.exe lenicivispn.dat 3225193763⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:3324 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3324 -s 12804⤵
- Program crash
PID:1380
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3324 -ip 33241⤵PID:5028
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138B
MD5dc20256ecb1a7d108e96a99092bdd628
SHA1d4cb2e02c5190ea13287f7dac6780c807f0b0eba
SHA2565dd36d416a6c482c02cb05b3a2d935cff4b0df2ec4346f95ab43105b8cdcff8b
SHA512c10f32efc0766dbc8c4669bef24a55bcd4c51b00efe685ef4d72da3a7bd394737c2d75d1f1b7b83cfec2bd876e3a9799066cbec5849d3cdf29e039fc5f3d2763
-
Filesize
1B
MD569691c7bdcc3ce6d5d8a1361f22d04ac
SHA1c63ae6dd4fc9f9dda66970e827d13f7c73fe841c
SHA25608f271887ce94707da822d5263bae19d5519cb3614e0daedc4c7ce5dab7473f1
SHA512253405e03b91441a6dd354a9b72e040068b1bfe10e83eb1a64a086c05525d8ccae2bf09130c624af50d55c3522a4fbb7c18cfc8dd843e5f4801d9ad2b5164b12
-
Filesize
3B
MD5158b365b9eedcfaf539f5dedfd82ee97
SHA1529f5d61ac99f60a8e473368eff1b32095a3e2bf
SHA25639561f8af034137905f14ca7fd5a2c891bc12982f3f8ef2271e75e93433ffa90
SHA512a1b231c2e6af432ee7df82e00d568819e12149af707d4c4fdd018b38cc4f9761062c5b7e497bd1b67e466b89e391520b88bf13f18c8b9ff646d82df740c05c09
-
Filesize
33B
MD5500ba63e2664798939744b8a8c9be982
SHA154743a77e4186cb327b803efb1ef5b3d4ac163ce
SHA2564ebc21177ee9907f71a1641a0482603ced98e9d43389cac0ffb0b59f7343eeba
SHA5129992b70de5867e2a00aff4f79c37ba71e827cbb104c192ebd4a553f91ae06a5b235f34e65d9d1145591c147e9e6726146cb92171945aa67b8f3294116a223fe7
-
Filesize
5.2MB
MD5a452946137958e0cee844310f9e9fa7c
SHA18cf21ae4d1d764154048a02fb49412ef94094485
SHA256088a5d04f2f6d6820bf1a6a390d9c0e00f88896c932848f0c97912b861479bb9
SHA512ef3759e134c9b0eaaf300a57d335131faa91337497f572ef7eb1058e498a071d1741a6e0947ca9e95fe92b1ca163814ce6d1d706ad5ab010d47d18038b26beaa
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
946KB
MD56c509582cbb2f1c8a6cbaed7b84ae567
SHA1ca0955fb4212398653a5d10e39d9cfc9328433a2
SHA256bf84aaaac698a09a059eaa650f0d0755df5fb0262181961620faea82c39106a3
SHA5120f29f0c5c12fcde2a640e8b91eff423e4aa9c7f34cb96c1f065cf80255be30ccf27b8d5196b94d8ca9e6be8aab33805b0b2f362093f02d3e891ba07347cfa138