Analysis
-
max time kernel
121s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
04/10/2023, 03:45
Static task
static1
Behavioral task
behavioral1
Sample
f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe
Resource
win10-20230915-en
General
-
Target
f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe
-
Size
1.5MB
-
MD5
a69adf7bf8b0a3c328afcd0caec0891a
-
SHA1
e95c22445a2ec8a228868a0a18ea8a25036642a0
-
SHA256
f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6
-
SHA512
30f640e6ac49d4af98a6a6179b829f2f1204a601814e0786205704f18d66b76395d650a01df9d2675b5ed4adf1c618058bc50a5e062f96e64e980e4661477146
-
SSDEEP
24576:2yh1TH4pJvTWKw783mY0Q5VOnhJuLErqHBc722FWJ14+U265pdO7BCybi:FbDEpTWKwoJ5VOnhXRLFwDb
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 856 Wx9To1FN.exe 1892 BG0iA5xn.exe 2772 gt1tO1kU.exe 2664 oW1Si6gJ.exe 2112 1up86ta9.exe -
Loads dropped DLL 14 IoCs
pid Process 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 856 Wx9To1FN.exe 856 Wx9To1FN.exe 1892 BG0iA5xn.exe 1892 BG0iA5xn.exe 2772 gt1tO1kU.exe 2772 gt1tO1kU.exe 2664 oW1Si6gJ.exe 2664 oW1Si6gJ.exe 2112 1up86ta9.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe 2504 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" Wx9To1FN.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" BG0iA5xn.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" gt1tO1kU.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" oW1Si6gJ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2112 set thread context of 2108 2112 1up86ta9.exe 34 -
Program crash 1 IoCs
pid pid_target Process procid_target 2504 2112 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 2180 wrote to memory of 856 2180 f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe 28 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 856 wrote to memory of 1892 856 Wx9To1FN.exe 29 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 1892 wrote to memory of 2772 1892 BG0iA5xn.exe 30 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2772 wrote to memory of 2664 2772 gt1tO1kU.exe 31 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2664 wrote to memory of 2112 2664 oW1Si6gJ.exe 32 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2108 2112 1up86ta9.exe 34 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35 PID 2112 wrote to memory of 2504 2112 1up86ta9.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe"C:\Users\Admin\AppData\Local\Temp\f4d3942f07c2de30ff8520425650186da520962e3754271b7dc07076d3583ea6.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Wx9To1FN.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:856 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\BG0iA5xn.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1892 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\gt1tO1kU.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\oW1Si6gJ.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\1up86ta9.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2112 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2108
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2112 -s 2847⤵
- Loads dropped DLL
- Program crash
PID:2504
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5f28bc9b1bdcc49f0c0cee638acc19175
SHA17a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d
SHA256e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466
SHA512ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115
-
Filesize
1.3MB
MD5f28bc9b1bdcc49f0c0cee638acc19175
SHA17a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d
SHA256e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466
SHA512ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115
-
Filesize
1.1MB
MD591656dc980607795ca3c59af8dd899e3
SHA1e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9
SHA256b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c
SHA51215ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8
-
Filesize
1.1MB
MD591656dc980607795ca3c59af8dd899e3
SHA1e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9
SHA256b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c
SHA51215ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8
-
Filesize
735KB
MD5513bdeef34cbcdd2a2dffca2613004e3
SHA19243b1bbccf4e007017372dd229352859586fa25
SHA2568a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b
SHA5128a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68
-
Filesize
735KB
MD5513bdeef34cbcdd2a2dffca2613004e3
SHA19243b1bbccf4e007017372dd229352859586fa25
SHA2568a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b
SHA5128a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68
-
Filesize
562KB
MD59d85aef4e8e537d704685861d77632c5
SHA112dff3811d1c391126f9d4264d8a50c57aecc8b2
SHA256e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284
SHA5125465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71
-
Filesize
562KB
MD59d85aef4e8e537d704685861d77632c5
SHA112dff3811d1c391126f9d4264d8a50c57aecc8b2
SHA256e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284
SHA5125465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.3MB
MD5f28bc9b1bdcc49f0c0cee638acc19175
SHA17a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d
SHA256e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466
SHA512ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115
-
Filesize
1.3MB
MD5f28bc9b1bdcc49f0c0cee638acc19175
SHA17a45d09b3dbbc67d9b7d0424c4d1483c26f4dc4d
SHA256e1ef05af6b3b4e7f05186afbafcb52d2aa01eebb40c2f124c333c15cd31bc466
SHA512ae15f8a6285eb4347bf2778ec19b9adcb134256d11f182710fb021504c841d24f1da852e219d1a84eaedae8d3d9a7f0f08a4f0de562c4a511c197fa18ce65115
-
Filesize
1.1MB
MD591656dc980607795ca3c59af8dd899e3
SHA1e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9
SHA256b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c
SHA51215ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8
-
Filesize
1.1MB
MD591656dc980607795ca3c59af8dd899e3
SHA1e9234454b7c1d4d0e1fab883cdbcdb93ab6cb8a9
SHA256b242807ada7f80afffc871d5651c1c26b319ec7dfed63c46bd949f869263ba4c
SHA51215ff993ae3eae35359fa75781e6d92375f0fa01ef2cb0cf58335bf4c2bcca3bb765755f7efd15ce4df02b152fb99a5b77151447b812c1704b95aea05b6ee01f8
-
Filesize
735KB
MD5513bdeef34cbcdd2a2dffca2613004e3
SHA19243b1bbccf4e007017372dd229352859586fa25
SHA2568a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b
SHA5128a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68
-
Filesize
735KB
MD5513bdeef34cbcdd2a2dffca2613004e3
SHA19243b1bbccf4e007017372dd229352859586fa25
SHA2568a6712606c31aa2d536286cf3ef923c1a4eaf8b36df669fa6a5ec5be0b502e5b
SHA5128a5f77891d723b6b63ecb9aafcb85a8e9a6589eefe29a5bef95ab7ffc48620ffdebd01bea6695458d1b5ba66a5395151cc7582dd6cb8c4babb36d1ec10826d68
-
Filesize
562KB
MD59d85aef4e8e537d704685861d77632c5
SHA112dff3811d1c391126f9d4264d8a50c57aecc8b2
SHA256e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284
SHA5125465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71
-
Filesize
562KB
MD59d85aef4e8e537d704685861d77632c5
SHA112dff3811d1c391126f9d4264d8a50c57aecc8b2
SHA256e57dd1874fee3f21d203d85d5049c631e86aa5b96e795f4124b1f77d3c024284
SHA5125465a52c53d038a15d4c968ed614316fb908fbfc6b8134e664bcacf172022b7e4a7343f8e1a9f0e1936df9a5ae29c6b34b943edea77b863bc6fcd83408a83e71
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6
-
Filesize
1.4MB
MD59b45c734f07328a3ac53e6551a95e81f
SHA16b29d75bd0fadc0f66ac5d67226eb9c5c1b231b0
SHA2563ef336a57f333d3a60a1b61a44fb13d82a0f71705190f703836a9ce243c3eeeb
SHA512817fe5e892875129897779586293c71ac01b74682458daa76b9db701b91b1a5db6b04bb79a7ca26c216c5042a17e4e6c582d5a26cdab0eb37e200b791e7574b6