Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
22/09/2023, 19:33
Static task
static1
Behavioral task
behavioral1
Sample
f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe
Resource
win10-20230915-en
General
-
Target
f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe
-
Size
954KB
-
MD5
8a24b35449368e705c3c60a24e0619da
-
SHA1
dac5f1a4204826eb6ece8141663a01a8d2a478b0
-
SHA256
f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219
-
SHA512
4db45c573bd4b7c1090c6840d69198bc6273e0a7d68af71a12ca58731cb36d0f4997af71b63bbf14c5c0d3525cc47c770ac6f88fc6137d22bcbb290969c75b9b
-
SSDEEP
24576:hybsAU5WW0ee/OmDXF0IwzKqlbtd9Wb2AxdWq:UcSl2m50IwzKObtdo2G
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3676 x2112296.exe 360 x9866590.exe 3668 x5192795.exe 4612 g4302783.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x2112296.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9866590.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5192795.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4612 set thread context of 1252 4612 g4302783.exe 75 -
Program crash 2 IoCs
pid pid_target Process procid_target 1152 4612 WerFault.exe 74 4236 1252 WerFault.exe 75 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 2496 wrote to memory of 3676 2496 f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe 71 PID 2496 wrote to memory of 3676 2496 f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe 71 PID 2496 wrote to memory of 3676 2496 f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe 71 PID 3676 wrote to memory of 360 3676 x2112296.exe 72 PID 3676 wrote to memory of 360 3676 x2112296.exe 72 PID 3676 wrote to memory of 360 3676 x2112296.exe 72 PID 360 wrote to memory of 3668 360 x9866590.exe 73 PID 360 wrote to memory of 3668 360 x9866590.exe 73 PID 360 wrote to memory of 3668 360 x9866590.exe 73 PID 3668 wrote to memory of 4612 3668 x5192795.exe 74 PID 3668 wrote to memory of 4612 3668 x5192795.exe 74 PID 3668 wrote to memory of 4612 3668 x5192795.exe 74 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75 PID 4612 wrote to memory of 1252 4612 g4302783.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe"C:\Users\Admin\AppData\Local\Temp\f35cf7c679c46b6353a5695c30596f6d33debaf893ac89764efbf0b67b6ab219.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2112296.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x2112296.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9866590.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9866590.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5192795.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5192795.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3668 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4302783.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4302783.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1252
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1252 -s 5687⤵
- Program crash
PID:4236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4612 -s 5806⤵
- Program crash
PID:1152
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD568c64fda651aa8d2050161a19f8c9ab6
SHA17d01bfa6037d9790e49bb3db48449993d65954fc
SHA256c13908b3f755111e470645edd1a9a45a963ad42d6d974572b57bcefbf244347c
SHA512b2804c2ce7aa3f8ba812febd3d85673edf3f77ea14e0210c5337394c55ecc6075f74c0bc78b0687e4bd78dad48da264efbe7a78664031f2904b5ce58fb03001d
-
Filesize
852KB
MD568c64fda651aa8d2050161a19f8c9ab6
SHA17d01bfa6037d9790e49bb3db48449993d65954fc
SHA256c13908b3f755111e470645edd1a9a45a963ad42d6d974572b57bcefbf244347c
SHA512b2804c2ce7aa3f8ba812febd3d85673edf3f77ea14e0210c5337394c55ecc6075f74c0bc78b0687e4bd78dad48da264efbe7a78664031f2904b5ce58fb03001d
-
Filesize
589KB
MD5cef48b394fbb6126a9e3b6d061fd881b
SHA1786642bf8af65b92e8a883f29473564f62fecf84
SHA25651a696f89f828eee0166ec341d87002299a39025c94f47c9531bf76224c7ad05
SHA512b983a5e9056e08bce4877ee7370d98bb70e81fdd3434068f3c9e1c51243d1e8b1150aeb205cc773260d854a5a06233681ccf3e20f9769c6c60c2ae8416e603f8
-
Filesize
589KB
MD5cef48b394fbb6126a9e3b6d061fd881b
SHA1786642bf8af65b92e8a883f29473564f62fecf84
SHA25651a696f89f828eee0166ec341d87002299a39025c94f47c9531bf76224c7ad05
SHA512b983a5e9056e08bce4877ee7370d98bb70e81fdd3434068f3c9e1c51243d1e8b1150aeb205cc773260d854a5a06233681ccf3e20f9769c6c60c2ae8416e603f8
-
Filesize
403KB
MD5ccc7533ab6e90adcf64b1baff0e54107
SHA10818e4ef2dc729a9bc7bb77d01b60420b5e25d73
SHA256f7f1c34e9be43085c8550f783c903f524bed06446796f5b147dba17c5db39ac7
SHA512b252bb47665dc5673480b9e7d51ce1dda84a5ae0c3020a8c7b96c193e43f2ff7a4d3db3fdfdace57a0687c0e2663f3458cb0b8441477f6951a4bf013ab029338
-
Filesize
403KB
MD5ccc7533ab6e90adcf64b1baff0e54107
SHA10818e4ef2dc729a9bc7bb77d01b60420b5e25d73
SHA256f7f1c34e9be43085c8550f783c903f524bed06446796f5b147dba17c5db39ac7
SHA512b252bb47665dc5673480b9e7d51ce1dda84a5ae0c3020a8c7b96c193e43f2ff7a4d3db3fdfdace57a0687c0e2663f3458cb0b8441477f6951a4bf013ab029338
-
Filesize
378KB
MD5f8f742fc0ab071d0a7a6fb9af3b42f58
SHA1b8ef8820176459431e537cb438b22aeb0ac2167a
SHA256397bd2db2a66bd254bf19b617387a27f9fb1092bbebc0cf2b65ed68f6f56dc55
SHA51267e986abf86368ea41415b58eb4afb582b82cc6f415582921f2f8da7cbc9bf1e18dbfa60cd4c1cfb18457af88b04b4e935f061c92362ddc96751512c39dd7891
-
Filesize
378KB
MD5f8f742fc0ab071d0a7a6fb9af3b42f58
SHA1b8ef8820176459431e537cb438b22aeb0ac2167a
SHA256397bd2db2a66bd254bf19b617387a27f9fb1092bbebc0cf2b65ed68f6f56dc55
SHA51267e986abf86368ea41415b58eb4afb582b82cc6f415582921f2f8da7cbc9bf1e18dbfa60cd4c1cfb18457af88b04b4e935f061c92362ddc96751512c39dd7891