Analysis
-
max time kernel
124s -
max time network
130s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
30/09/2023, 00:41
Static task
static1
Behavioral task
behavioral1
Sample
7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe
Resource
win10-20230915-en
General
-
Target
7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe
-
Size
928KB
-
MD5
bbf349f1ac6b14881515896d5819d0a7
-
SHA1
2be4202c77bab94925a309fa1f7ecd997afc21e5
-
SHA256
7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535
-
SHA512
a2017a6877794d5c72b74a0ab2ec6c368ae5c9d60155818d2c2091b65f9107ea75543b7b2ec862b60062d135e113c5240aa4cc9d1f2877d3689a84107babfbf7
-
SSDEEP
24576:tyXFvfHZwiTP7jgQvP+G0MYwePrc1O8ogxOWFEvxQmo:IXFvfHZ/Djg6H0BrZLZWOim
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5064 x5320666.exe 2528 x2791908.exe 1168 x4909937.exe 4244 g7753941.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5320666.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2791908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4909937.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4244 set thread context of 2572 4244 g7753941.exe 75 -
Program crash 2 IoCs
pid pid_target Process procid_target 3368 4244 WerFault.exe 73 3720 2572 WerFault.exe 75 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 3928 wrote to memory of 5064 3928 7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe 70 PID 3928 wrote to memory of 5064 3928 7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe 70 PID 3928 wrote to memory of 5064 3928 7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe 70 PID 5064 wrote to memory of 2528 5064 x5320666.exe 71 PID 5064 wrote to memory of 2528 5064 x5320666.exe 71 PID 5064 wrote to memory of 2528 5064 x5320666.exe 71 PID 2528 wrote to memory of 1168 2528 x2791908.exe 72 PID 2528 wrote to memory of 1168 2528 x2791908.exe 72 PID 2528 wrote to memory of 1168 2528 x2791908.exe 72 PID 1168 wrote to memory of 4244 1168 x4909937.exe 73 PID 1168 wrote to memory of 4244 1168 x4909937.exe 73 PID 1168 wrote to memory of 4244 1168 x4909937.exe 73 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75 PID 4244 wrote to memory of 2572 4244 g7753941.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe"C:\Users\Admin\AppData\Local\Temp\7205402ff64bc3f67000f198c5193c01e44823724bbe6db455601d94f490a535.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5320666.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5320666.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5064 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2791908.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2791908.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4909937.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4909937.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7753941.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g7753941.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4244 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 5687⤵
- Program crash
PID:3720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4244 -s 5726⤵
- Program crash
PID:3368
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD58f90d505f03573b501046a5ba623c757
SHA18974ca50342fcbd203327f433fb05578baf54296
SHA25687d892526699bd917d535e58347463abb991544a32afb8e89a5146c05b1030ea
SHA512885da02e40d5afc07463f257d54800ef21755176139751e336e871c5f6665b173708c43964e876eb7b4c8c676cfa2739ca90737eb0da23f048a37a0ee0a99be8
-
Filesize
826KB
MD58f90d505f03573b501046a5ba623c757
SHA18974ca50342fcbd203327f433fb05578baf54296
SHA25687d892526699bd917d535e58347463abb991544a32afb8e89a5146c05b1030ea
SHA512885da02e40d5afc07463f257d54800ef21755176139751e336e871c5f6665b173708c43964e876eb7b4c8c676cfa2739ca90737eb0da23f048a37a0ee0a99be8
-
Filesize
555KB
MD5e1e4633918666ea3f458fee5ff31f31e
SHA188036734407396e579a9703578acfb0cd9b15a09
SHA256ad056b57f0e633c2ecf6d14cff40ed2d366b1dea44e29fbd7a32462c63afb82b
SHA5122890a7b3fe213f25d2f9484853c781d92febf74e1d98ff57cac2022c14d3976efac5dc54d0ac9b7b731400addfe86412e57689b10a91eff6ddfaf98cfa2027ee
-
Filesize
555KB
MD5e1e4633918666ea3f458fee5ff31f31e
SHA188036734407396e579a9703578acfb0cd9b15a09
SHA256ad056b57f0e633c2ecf6d14cff40ed2d366b1dea44e29fbd7a32462c63afb82b
SHA5122890a7b3fe213f25d2f9484853c781d92febf74e1d98ff57cac2022c14d3976efac5dc54d0ac9b7b731400addfe86412e57689b10a91eff6ddfaf98cfa2027ee
-
Filesize
389KB
MD557ef24e45e581836c2babf4b0928923e
SHA1189ee66924e37db14423034822216c4ec675c02a
SHA256f675e978f0414ffc3cb504c8dab30c7bb0fdba884cbc03b12b55ab017239a50f
SHA5128e027e22a34270105b95a94849186b53d4ee2feff308110144304c9f35217fcd9f30dbd40570af515e70062d7277502f571398f524c2961a0d6837f08661098b
-
Filesize
389KB
MD557ef24e45e581836c2babf4b0928923e
SHA1189ee66924e37db14423034822216c4ec675c02a
SHA256f675e978f0414ffc3cb504c8dab30c7bb0fdba884cbc03b12b55ab017239a50f
SHA5128e027e22a34270105b95a94849186b53d4ee2feff308110144304c9f35217fcd9f30dbd40570af515e70062d7277502f571398f524c2961a0d6837f08661098b
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea
-
Filesize
356KB
MD5bab1b99956076a291c8ac5eb5af9c117
SHA113c92d4af43b0d14a5c518d5ad1c15ed61d58d03
SHA256e9f2fad21cb9b9a821ecf98c7d7653a3ef7d7b065dd3142de98c342a8f9c13fe
SHA512147749b33255b3a48061723a7272d00e9ab83bd89cf49d42bffd962bd2b3b256e2a133e83306e0ea7a6c32dc01c2245143d21df4f3e3314e0d037cc9d86feaea