Analysis
-
max time kernel
188s -
max time network
296s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
04-10-2023 04:48
Static task
static1
Behavioral task
behavioral1
Sample
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
Resource
win10-20230915-en
General
-
Target
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe
-
Size
928KB
-
MD5
3b0702d6a6ef1940e5c745a3cd6a9a41
-
SHA1
3b7ecc2c01ead9014d827c368fc197059a0e3200
-
SHA256
6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba
-
SHA512
80ae9454fd2bb945daa256dbd29571c528f068a23c9475e3a2ef6c0bcce8522f5caa48bff633905f3cf91bd71c85d7af5449c0a023bb69d7566bb2b88b45f76a
-
SSDEEP
12288:rMrey90rAt8kShe4IudlvYsyoiip6vR/3aaxGk4+/9U4lIxBsx4ShHZ+XV5Eq8qv:JycdVZo5/ddfuBpSHwV5E5emBQX
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2168 x6526259.exe 308 x6572699.exe 3868 x6858340.exe 2096 g0448141.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x6526259.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6572699.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6858340.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2096 set thread context of 2036 2096 g0448141.exe 75 -
Program crash 2 IoCs
pid pid_target Process procid_target 3096 2096 WerFault.exe 73 412 2036 WerFault.exe 75 -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4424 wrote to memory of 2168 4424 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 70 PID 4424 wrote to memory of 2168 4424 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 70 PID 4424 wrote to memory of 2168 4424 6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe 70 PID 2168 wrote to memory of 308 2168 x6526259.exe 71 PID 2168 wrote to memory of 308 2168 x6526259.exe 71 PID 2168 wrote to memory of 308 2168 x6526259.exe 71 PID 308 wrote to memory of 3868 308 x6572699.exe 72 PID 308 wrote to memory of 3868 308 x6572699.exe 72 PID 308 wrote to memory of 3868 308 x6572699.exe 72 PID 3868 wrote to memory of 2096 3868 x6858340.exe 73 PID 3868 wrote to memory of 2096 3868 x6858340.exe 73 PID 3868 wrote to memory of 2096 3868 x6858340.exe 73 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75 PID 2096 wrote to memory of 2036 2096 g0448141.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe"C:\Users\Admin\AppData\Local\Temp\6f409be2ce6f2984ec0ef230bb1423e6b2080a44f470ddd19df491edf23656ba.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4424 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6526259.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x6526259.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6572699.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6572699.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6858340.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6858340.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0448141.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0448141.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2036
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 5687⤵
- Program crash
PID:412
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2096 -s 1446⤵
- Program crash
PID:3096
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
826KB
MD56d368034064f4aec421b17f47f6ab9f6
SHA1c5cecdd9aae0ae1ef4150e41f6667a79d31cc98d
SHA256c893a0de68f5da325b89b7fd9217c61cee835fe27b7d9aec72e49c7c2feec88d
SHA5120abf44ae84e4d790996ae0e13197043854bf33e6eb75e566e23784d85ea024bb5c9fe667b5c74ddb804a05bbbb1dc280a9ce89d2b0cda50d6adf0ac27e9b3d8b
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
555KB
MD5332c5201b49536e5009b836de1cf871f
SHA10455d521fd075d1da39bd67694ee544876490053
SHA256b670547008ac27039f970cf706a77a85aa048226e6390f3499b5e4fc847d5c6a
SHA5128811998ed67dfd4000b79901a6d57b82acd1a8116f470b0d259f99ddff5fc6d929e53ba6e01f963ff869074f288a38d9c9193d67a93eebea5f91f31e846630ea
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
390KB
MD5559a684b443f9e536c88bff0fee1f391
SHA1032fc9af866425f80d32b8ba866adde044a6c65c
SHA256ccfa9d671b3bd152015ed1809647d31a05c697c10994bcf57387bd02bdfc03ce
SHA5127fd64d632ff1695dc4ae4dba89ce6f87c89381f2efc1ad63a896b4e3cc4a9e77766d0ab10f576cff7e2fe19427d81218911c136f8d037e28de42721d95185d02
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4
-
Filesize
356KB
MD540a553810d7b000a4499d6c06871f399
SHA11bc6cd10ad85e59cecd82d2711d0c585787d1e2b
SHA256e16b92deccaeddbade8747eadcd51ec820658c4c92b859190d75281c9d84dab3
SHA51214cede07c2782ebc859861597db56ac059bc4e008eda5d856a146b20f8ebd7e3237264242255d29b849aa5c400ef07767c66e41c5c4c96d60f618401b22655e4