Analysis
-
max time kernel
118s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
20-09-2023 16:19
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230831-en
General
-
Target
file.exe
-
Size
1.4MB
-
MD5
a749c50e50bea83a415298bf40d03217
-
SHA1
066a179765249fa78765aa7c2ab063f7501d76be
-
SHA256
7dedf613bef159a338fa71ae8e77e11899f9f5314ac3ebbb63c70d24537c3c73
-
SHA512
55ebf9e07f9c828e17bbb68f7e4607f50c90b58f0f1910de51d2b2574ea32cea581138c1415405f004c6457d47cebb98b215be5af01d666f0d00f23da9c1ea0b
-
SSDEEP
24576:JywNd7sZxBoGLHldxRjAQ7Vz1lhfqIFNRyaQW2RxyK0uX0IMVJ2Ay:8wX8xBfRHGmV7NMaQWw4sMyA
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1708 v5664030.exe 2584 v1542590.exe 2688 v7845412.exe 2596 a7185366.exe -
Loads dropped DLL 13 IoCs
pid Process 1008 file.exe 1708 v5664030.exe 1708 v5664030.exe 2584 v1542590.exe 2584 v1542590.exe 2688 v7845412.exe 2688 v7845412.exe 2688 v7845412.exe 2596 a7185366.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe 2832 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" file.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v5664030.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v1542590.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v7845412.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2596 set thread context of 2776 2596 a7185366.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2832 2596 WerFault.exe 32 2660 2776 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1008 wrote to memory of 1708 1008 file.exe 29 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 1708 wrote to memory of 2584 1708 v5664030.exe 30 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2584 wrote to memory of 2688 2584 v1542590.exe 31 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2688 wrote to memory of 2596 2688 v7845412.exe 32 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2596 wrote to memory of 2776 2596 a7185366.exe 34 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2776 wrote to memory of 2660 2776 AppLaunch.exe 36 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35 PID 2596 wrote to memory of 2832 2596 a7185366.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1008 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v5664030.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v1542590.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v7845412.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a7185366.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2687⤵
- Program crash
PID:2660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2596 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2832
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f98b69ab7f60d3e64af2c247a5edec32
SHA10f1d5911e84d396c7a1b01945f75e41b00f5eb55
SHA256e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec
SHA512054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659
-
Filesize
1.3MB
MD5f98b69ab7f60d3e64af2c247a5edec32
SHA10f1d5911e84d396c7a1b01945f75e41b00f5eb55
SHA256e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec
SHA512054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659
-
Filesize
947KB
MD532ffac3cd3bde991c46d0979d77c62c6
SHA117bd5348d742ea7d816071836e7bb9abbaeb2f8d
SHA256d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6
SHA51216226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676
-
Filesize
947KB
MD532ffac3cd3bde991c46d0979d77c62c6
SHA117bd5348d742ea7d816071836e7bb9abbaeb2f8d
SHA256d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6
SHA51216226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676
-
Filesize
542KB
MD5a49e9c5431eee21f33803475caea2246
SHA1fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c
SHA2568a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d
SHA512317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca
-
Filesize
542KB
MD5a49e9c5431eee21f33803475caea2246
SHA1fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c
SHA2568a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d
SHA512317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.3MB
MD5f98b69ab7f60d3e64af2c247a5edec32
SHA10f1d5911e84d396c7a1b01945f75e41b00f5eb55
SHA256e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec
SHA512054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659
-
Filesize
1.3MB
MD5f98b69ab7f60d3e64af2c247a5edec32
SHA10f1d5911e84d396c7a1b01945f75e41b00f5eb55
SHA256e11cbd5bb58db1fb8631a985bec1044e3c7a3bbdecb1d342aaf9f989394819ec
SHA512054ccc115146541594ad39b968d1314f13ef65b49f2ac9931b4a9bfd0831bf88972daf9b7be34feba0f1a34566830f44986c634b32004ba8d7aa0f857f84d659
-
Filesize
947KB
MD532ffac3cd3bde991c46d0979d77c62c6
SHA117bd5348d742ea7d816071836e7bb9abbaeb2f8d
SHA256d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6
SHA51216226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676
-
Filesize
947KB
MD532ffac3cd3bde991c46d0979d77c62c6
SHA117bd5348d742ea7d816071836e7bb9abbaeb2f8d
SHA256d0147d1d0be27bdcde96bc2f205e7017a8bc836f0d3bf5b69c1bc6aaddef0bc6
SHA51216226b9f8d03c03b96579ff6cee095957f3ee8cd4399a0d391bd1c1603b934c45876552e5b3fb909c993940b080dec1bec95d2769c2d513aef2b4033467f7676
-
Filesize
542KB
MD5a49e9c5431eee21f33803475caea2246
SHA1fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c
SHA2568a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d
SHA512317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca
-
Filesize
542KB
MD5a49e9c5431eee21f33803475caea2246
SHA1fdb4f0fef5b3b198afdeeae6f763a76f533dcd6c
SHA2568a2327da8d6d452b987fbf4da08718869756657314c4f93c6c2301770ca8661d
SHA512317295c78c8a22d95266968ed7805c563f3c24733a32dbb0ccc8f475e060c4567ee1e457bccedcea987be0787de6459ffa72be0cbe7f5cf815639f9e56d3aaca
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164
-
Filesize
1.0MB
MD5c56d55f157eea7b4fdb488186c67387e
SHA1bf155ed713277962773f4af2ce9be745a50b2cf8
SHA256660b64ed4158fe457cc88f4f629283589f99fa6f60b4c30657b0430ead08ed12
SHA512bfd15f35d754e8d4ba2b0214cd53c5c5b61241a70b0db644ef7c4ecd838bf5eb9b4513764b5d4bb411c66d327028edf6603af28fddbd4671f9386d38e99a9164