Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
02-10-2023 04:47
Static task
static1
Behavioral task
behavioral1
Sample
0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe
Resource
win10-20230915-en
General
-
Target
0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe
-
Size
928KB
-
MD5
e86e3225cbacf1340b9b8f894a653510
-
SHA1
e951652fe627d615003be92c28360a1fb2f69bab
-
SHA256
0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad
-
SHA512
b1be99d54f011e30e323524956b7f9a4663d68deabb99eaeb54cf3f648b72954782cf7298ef6ad89db10ae94cb5fa78cbf38a39c26fa5ba1db6c6950b900ea3c
-
SSDEEP
12288:BMrny905rxdMWUV/6GO8yvUKq/UuxEdUXYSDOi9rDhAUuIQPoEAjRae6zyTXuE:iy4U56G5UuxEdUXY+9rDhAzIo9ylR
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2824 x6796756.exe 2300 x4014442.exe 2768 x8240295.exe 2504 g0338489.exe -
Loads dropped DLL 13 IoCs
pid Process 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 2824 x6796756.exe 2824 x6796756.exe 2300 x4014442.exe 2300 x4014442.exe 2768 x8240295.exe 2768 x8240295.exe 2768 x8240295.exe 2504 g0338489.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe 2604 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8240295.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6796756.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4014442.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2504 set thread context of 2956 2504 g0338489.exe 33 -
Program crash 1 IoCs
pid pid_target Process procid_target 2604 2504 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2088 wrote to memory of 2824 2088 0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe 28 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2824 wrote to memory of 2300 2824 x6796756.exe 29 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2300 wrote to memory of 2768 2300 x4014442.exe 30 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2768 wrote to memory of 2504 2768 x8240295.exe 31 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2956 2504 g0338489.exe 33 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34 PID 2504 wrote to memory of 2604 2504 g0338489.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe"C:\Users\Admin\AppData\Local\Temp\0030659fa1bc36e6b6d5a843e6fe8c01eaa6c430b3430ef32dd6e926d508e3ad.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6796756.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4014442.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8240295.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0338489.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2504 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2956
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2766⤵
- Loads dropped DLL
- Program crash
PID:2604
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD5b31e85f9f9a77fd4b808e6ce6b0cf9c3
SHA1f746f5513362788d58a9e916e33df2b28ba0c173
SHA2565094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e
SHA512b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55
-
Filesize
826KB
MD5b31e85f9f9a77fd4b808e6ce6b0cf9c3
SHA1f746f5513362788d58a9e916e33df2b28ba0c173
SHA2565094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e
SHA512b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55
-
Filesize
556KB
MD5ee2d5ab0c8e4cb51075308649b521df7
SHA15720be513f8b944464c80a8486abd6a0971b8fe1
SHA256fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf
SHA512486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6
-
Filesize
556KB
MD5ee2d5ab0c8e4cb51075308649b521df7
SHA15720be513f8b944464c80a8486abd6a0971b8fe1
SHA256fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf
SHA512486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6
-
Filesize
390KB
MD52edfec9b922c03e66dc843caf2fa2bfa
SHA1c64d441e7514024e3b78c7811f4807dc3ee1ef2a
SHA2568784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07
SHA51268ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea
-
Filesize
390KB
MD52edfec9b922c03e66dc843caf2fa2bfa
SHA1c64d441e7514024e3b78c7811f4807dc3ee1ef2a
SHA2568784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07
SHA51268ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
826KB
MD5b31e85f9f9a77fd4b808e6ce6b0cf9c3
SHA1f746f5513362788d58a9e916e33df2b28ba0c173
SHA2565094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e
SHA512b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55
-
Filesize
826KB
MD5b31e85f9f9a77fd4b808e6ce6b0cf9c3
SHA1f746f5513362788d58a9e916e33df2b28ba0c173
SHA2565094ee6cfc4fd0f47a91a0e36a1f7a4f2678b6d107ec010e15dd956f4110c75e
SHA512b452e987419bd02d5dca828e0406f7d40b5b3fea89dbd1471a70a61fa4c1a59fb7d7ec5762469b8161b371663770a7f0ef8dad702d1bf4c16db8fa256e35fe55
-
Filesize
556KB
MD5ee2d5ab0c8e4cb51075308649b521df7
SHA15720be513f8b944464c80a8486abd6a0971b8fe1
SHA256fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf
SHA512486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6
-
Filesize
556KB
MD5ee2d5ab0c8e4cb51075308649b521df7
SHA15720be513f8b944464c80a8486abd6a0971b8fe1
SHA256fec46ed603f2bcca18ba46485cb2a5d5175a0e7a69f217bf0549062fa05c1bbf
SHA512486e20f37b0237428b5d25c82c2075a48c51d7be34b78641a71cb0b5728e792b50d478cb23dba34d5c88e7b05697c344fa2cf1e1a7095f01d9bb14f2c066b0c6
-
Filesize
390KB
MD52edfec9b922c03e66dc843caf2fa2bfa
SHA1c64d441e7514024e3b78c7811f4807dc3ee1ef2a
SHA2568784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07
SHA51268ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea
-
Filesize
390KB
MD52edfec9b922c03e66dc843caf2fa2bfa
SHA1c64d441e7514024e3b78c7811f4807dc3ee1ef2a
SHA2568784cc7467954f84aefde0b4fdae2235dd6d5ce255a9a355dcaeb25abf80ff07
SHA51268ccd2d852b18e61c353c7bd974dfbea4c56143fa1c044b291c718b5886e4b67270514f77e0c06ae78e7101f377828a256f42cee92506b126568deb083610cea
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16
-
Filesize
356KB
MD5f706f76ef00ab183d88d4a073037c016
SHA1acb5f024d70cc21913b34f7634c70fd6c19b584c
SHA25606b54283cd5e893b5a80456aecd9e084a6e71b40e2fef93a3c100d72caa20461
SHA512bade164fb84ddafa5415e78c3cd213e25989c01a337e05c9c0acd1c0a61761f9cb38d6844fd8a5b65d8416f9cc76f9824a67aba47048cabf3e3da90a1de02c16