Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
10/10/2023, 01:00
Static task
static1
Behavioral task
behavioral1
Sample
cW1zt5nY.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cW1zt5nY.exe
Resource
win10-20230915-en
General
-
Target
cW1zt5nY.exe
-
Size
640KB
-
MD5
051e59fba85fde81cadfc4f1d38e57c9
-
SHA1
195e2fd8be333f9ce2975c94597559717dd62594
-
SHA256
725a783f5f272539f2899ff53fe5d44dc6ed17abef1bcdcdedaed513b3d1465a
-
SHA512
6db8f4926635ffca26b2155c99d35172bb2da053f515b80a2cf5a3e3af22c7333b1f374b7987055196cd4a3fe2967b1b88fb72fb653e21aadd4ba63f023f0b34
-
SSDEEP
12288:eMrVy90Z23Ox+QJJDJOM7HPWtNH8NVDAhG+g57y3/m:rytexp7vWtiLAhYKO
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1916 gv9UC9wQ.exe 2304 1vF30CZ6.exe -
Loads dropped DLL 9 IoCs
pid Process 1796 cW1zt5nY.exe 1916 gv9UC9wQ.exe 1916 gv9UC9wQ.exe 1916 gv9UC9wQ.exe 2304 1vF30CZ6.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe 2828 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cW1zt5nY.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" gv9UC9wQ.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2304 set thread context of 2768 2304 1vF30CZ6.exe 31 -
Program crash 2 IoCs
pid pid_target Process procid_target 2788 2768 WerFault.exe 31 2828 2304 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1796 wrote to memory of 1916 1796 cW1zt5nY.exe 28 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 1916 wrote to memory of 2304 1916 gv9UC9wQ.exe 29 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2752 2304 1vF30CZ6.exe 30 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2304 wrote to memory of 2768 2304 1vF30CZ6.exe 31 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2768 wrote to memory of 2788 2768 AppLaunch.exe 32 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33 PID 2304 wrote to memory of 2828 2304 1vF30CZ6.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\cW1zt5nY.exe"C:\Users\Admin\AppData\Local\Temp\cW1zt5nY.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gv9UC9wQ.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\gv9UC9wQ.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1vF30CZ6.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\1vF30CZ6.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵PID:2752
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 2685⤵
- Program crash
PID:2788
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2304 -s 2924⤵
- Loads dropped DLL
- Program crash
PID:2828
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
444KB
MD5caf7fdc4f860ec575b24322e40786db4
SHA17fb3f36f6f8871d85e35fbb0de8f634020a3a819
SHA256850de913df9288bc4ab5e6d2508180950974a9d0fa7d52440a9b47f82baa036d
SHA5122b3ead02bc3b024789b6fe6b1176bc742692bc8e48c7c476bfa66809cd1c6ef24ce2c2a805227a0cac698c9ddadea76dd8d6ecab6982aa1da52493114253b921
-
Filesize
444KB
MD5caf7fdc4f860ec575b24322e40786db4
SHA17fb3f36f6f8871d85e35fbb0de8f634020a3a819
SHA256850de913df9288bc4ab5e6d2508180950974a9d0fa7d52440a9b47f82baa036d
SHA5122b3ead02bc3b024789b6fe6b1176bc742692bc8e48c7c476bfa66809cd1c6ef24ce2c2a805227a0cac698c9ddadea76dd8d6ecab6982aa1da52493114253b921
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
444KB
MD5caf7fdc4f860ec575b24322e40786db4
SHA17fb3f36f6f8871d85e35fbb0de8f634020a3a819
SHA256850de913df9288bc4ab5e6d2508180950974a9d0fa7d52440a9b47f82baa036d
SHA5122b3ead02bc3b024789b6fe6b1176bc742692bc8e48c7c476bfa66809cd1c6ef24ce2c2a805227a0cac698c9ddadea76dd8d6ecab6982aa1da52493114253b921
-
Filesize
444KB
MD5caf7fdc4f860ec575b24322e40786db4
SHA17fb3f36f6f8871d85e35fbb0de8f634020a3a819
SHA256850de913df9288bc4ab5e6d2508180950974a9d0fa7d52440a9b47f82baa036d
SHA5122b3ead02bc3b024789b6fe6b1176bc742692bc8e48c7c476bfa66809cd1c6ef24ce2c2a805227a0cac698c9ddadea76dd8d6ecab6982aa1da52493114253b921
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8
-
Filesize
423KB
MD5bf3af0dae174d1f1c9ddee7a921a61e6
SHA11db9718c7660b36a44f74508b0573a82b333b2ec
SHA256c05645f26b03756684a080734c09519887302a6a45c98647fa303e42799473f5
SHA512529f16a3fec0a570328fd1a102a98255a08d80a801ef9794e742a3c0c729d502f6543848398075f57050457340ea7422376686feae2c259f384fdb67b3e69da8