Resubmissions
06-03-2024 14:44
240306-r37vpabh3t 1029-02-2024 14:40
240229-r1xxpsca9w 1029-02-2024 14:06
240229-rex1ksbh32 1022-09-2023 07:22
230922-h7pp8see3w 1022-09-2023 07:17
230922-h4nzjaee2t 10Analysis
-
max time kernel
122s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
22-09-2023 07:22
Static task
static1
Behavioral task
behavioral1
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win10v2004-20230915-en
General
-
Target
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
-
Size
1.0MB
-
MD5
8041d9fab3740fbaa0ff927a0908e073
-
SHA1
54e32969e2666415cc1c02c45ad70e3f90d7d938
-
SHA256
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
SHA512
ba80f1d90cd879de0866f5cd5834b0c0122c59c41b3062b5ce30ff954d5bb5600e968fda278c0dd5343166c83a779ed4fcfd085b5149de4434398c7c97b774fa
-
SSDEEP
24576:MymXcVy4JB5oYHDPySOw7yVjwp2eok+RIWGIT6hjpX8T/JSJWe:7mXcVjXoE7yZwvokcuITEjpX8T/Jr
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
x9498095.exex4203749.exex6052541.exeg2922257.exepid process 2208 x9498095.exe 2036 x4203749.exe 2704 x6052541.exe 2936 g2922257.exe -
Loads dropped DLL 13 IoCs
Processes:
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exex9498095.exex4203749.exex6052541.exeg2922257.exeWerFault.exepid process 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 2208 x9498095.exe 2208 x9498095.exe 2036 x4203749.exe 2036 x4203749.exe 2704 x6052541.exe 2704 x6052541.exe 2704 x6052541.exe 2936 g2922257.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe 2672 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exex9498095.exex4203749.exex6052541.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9498095.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4203749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6052541.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
g2922257.exedescription pid process target process PID 2936 set thread context of 2532 2936 g2922257.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2672 2936 WerFault.exe g2922257.exe 2800 2532 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exex9498095.exex4203749.exex6052541.exeg2922257.exeAppLaunch.exedescription pid process target process PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 1744 wrote to memory of 2208 1744 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe x9498095.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2208 wrote to memory of 2036 2208 x9498095.exe x4203749.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2036 wrote to memory of 2704 2036 x4203749.exe x6052541.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2704 wrote to memory of 2936 2704 x6052541.exe g2922257.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2936 wrote to memory of 2532 2936 g2922257.exe AppLaunch.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2532 wrote to memory of 2800 2532 AppLaunch.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe PID 2936 wrote to memory of 2672 2936 g2922257.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe"C:\Users\Admin\AppData\Local\Temp\a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9498095.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9498095.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4203749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4203749.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6052541.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6052541.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2922257.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2922257.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2687⤵
- Program crash
PID:2800
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2672
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9