Analysis
-
max time kernel
120s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-10-2023 20:25
Static task
static1
Behavioral task
behavioral1
Sample
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
Resource
win10v2004-20230915-en
General
-
Target
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe
-
Size
866KB
-
MD5
eeacddb883c73f4e22781b88dbfb5b3b
-
SHA1
a5d7426e70b412785d331fc96273ea4b1d987cc3
-
SHA256
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9
-
SHA512
753a4758d6da1ab7188b70356c4decaa39344f6cd33b533b5d11c7e4ef564ec211f60ca94130f87fbfeaeea4db303cda4c90a8865ae6d1d1b67050e95b9a70fb
-
SSDEEP
12288:YMrIy90jM4BLFyCmkb+iePQUprgyb+mfT/myMJdhSiG4gJgQLUmUPkerkxiexhik:gywMA4Cx2YUprfRfTOxDxQL/2kxieF5
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
z9569971.exez4051908.exez9258037.exer5800198.exepid process 2728 z9569971.exe 2556 z4051908.exe 2648 z9258037.exe 2664 r5800198.exe -
Loads dropped DLL 13 IoCs
Processes:
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exez9569971.exez4051908.exez9258037.exer5800198.exeWerFault.exepid process 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe 2728 z9569971.exe 2728 z9569971.exe 2556 z4051908.exe 2556 z4051908.exe 2648 z9258037.exe 2648 z9258037.exe 2648 z9258037.exe 2664 r5800198.exe 2592 WerFault.exe 2592 WerFault.exe 2592 WerFault.exe 2592 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
Processes:
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exez9569971.exez4051908.exez9258037.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z9569971.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z4051908.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z9258037.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
r5800198.exedescription pid process target process PID 2664 set thread context of 2456 2664 r5800198.exe AppLaunch.exe -
Program crash 2 IoCs
Processes:
WerFault.exeWerFault.exepid pid_target process target process 2592 2664 WerFault.exe r5800198.exe 2428 2456 WerFault.exe AppLaunch.exe -
Suspicious use of WriteProcessMemory 56 IoCs
Processes:
a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exez9569971.exez4051908.exez9258037.exer5800198.exeAppLaunch.exedescription pid process target process PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2924 wrote to memory of 2728 2924 a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe z9569971.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2728 wrote to memory of 2556 2728 z9569971.exe z4051908.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2556 wrote to memory of 2648 2556 z4051908.exe z9258037.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2648 wrote to memory of 2664 2648 z9258037.exe r5800198.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2664 wrote to memory of 2456 2664 r5800198.exe AppLaunch.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe PID 2456 wrote to memory of 2428 2456 AppLaunch.exe WerFault.exe PID 2664 wrote to memory of 2592 2664 r5800198.exe WerFault.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe"C:\Users\Admin\AppData\Local\Temp\a7f449bc49be6f53213a078f41a3f1b222febee4a1bcb9c6d7f8fdddee03bad9_JC.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9569971.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z9569971.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4051908.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z4051908.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9258037.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z9258037.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5800198.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\r5800198.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 2687⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2592
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
764KB
MD548ef9ed634eac6873652b73fa16bbd62
SHA1b27315492b816bc520e1d5648d271f0651c979e7
SHA256b5f7176a1fe57e13ad243269529dc8d26c29b82ca3c177302978df1cc2cf3026
SHA512e4058feeefbcb0139501727b6f6c7de566530c4433821351404e659d5def4f9f897f6e90e2d914a45888106b6208c1419447a10983fc343c8687a607d23a77e2
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
581KB
MD56108620755bba9aa8ce0a2d0f421d7f2
SHA19779d7d25f6cbb4ff4e2c9bd8435caa03734dbb7
SHA256202d91db0a04736e9fb6f6853d2d23c213ab917aaa2142a2374064f961473142
SHA512281d6d2d8995ff3a4fe586be2d4025e4aa83fe9c963db6ae8e432e5d44917e01d91a1cfdf9c8ee74b3f8a2e4f7c9399833497c22a46d1f6166518536d56b1eff
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
399KB
MD58fc97389945c83c9b91a75717a2efa32
SHA125a1e97fde336da9e2b82a66bfa21e4a020cfeb2
SHA25636307a145fb1b4033f65156a162244db10e27fad32ae94068b2f907d10593378
SHA512d1823fa2990761b3e2500749d2f23e3ec678b942ed184cae503533da555f2e517883735c5ffe3c4c88bc9fa92ead6a2c2a07aae8d0204f949468f5b75bae44dc
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6
-
Filesize
356KB
MD5508738b551ea75995a12a8758cb8c3fb
SHA1857907bd1a14547864c49afd34108de7209a1915
SHA2569d6a13aac79e1b599aec9f6b078d4b78a6c22d48bebc1eb5e2fbc37a00d624c3
SHA512feba8ac1431befae9fa7b1c47e104263d079967befb60aaf80d10e0e572e7bfde6f4b373a98fc331270fb6e073540800ed16b683b687635268a5d5731abde7e6