Analysis
-
max time kernel
120s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11-10-2023 11:35
Static task
static1
Behavioral task
behavioral1
Sample
dummy.bin.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
dummy.bin.exe
Resource
win10v2004-20230915-en
General
-
Target
dummy.bin.exe
-
Size
2.5MB
-
MD5
65e17ed13f100252e776030ed3965fd5
-
SHA1
1a67346291bbf8bd4826cf8929ab74f2ab21c39b
-
SHA256
29ca825cf8bcf95d6fbd998f2c28cea0f990add70242f06f1421fa92316411ee
-
SHA512
6b096b195dc31298f5c495c188611ae94bbff7319cf1dedf25fec3260349b8f441983c9669669027f46020f58a2236d3435cd098abc5c69e38f713acc8f4767f
-
SSDEEP
49152:Qn8uewL1WSGpm8IgKSYXfnE0cVKrQvl0eMdkLyGsAdm+ADQz3DYj:7/hG3tE00KC0tkLyGl7AcDDE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2736 fkxyeofqgyi.exe -
Loads dropped DLL 2 IoCs
pid Process 2028 cmd.exe 2736 fkxyeofqgyi.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" dummy.bin.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2736 fkxyeofqgyi.exe 2736 fkxyeofqgyi.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2164 wrote to memory of 2028 2164 dummy.bin.exe 29 PID 2028 wrote to memory of 2736 2028 cmd.exe 31 PID 2028 wrote to memory of 2736 2028 cmd.exe 31 PID 2028 wrote to memory of 2736 2028 cmd.exe 31 PID 2028 wrote to memory of 2736 2028 cmd.exe 31 PID 2028 wrote to memory of 2736 2028 cmd.exe 31 PID 2028 wrote to memory of 2736 2028 cmd.exe 31 PID 2028 wrote to memory of 2736 2028 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dummy.bin.exe"C:\Users\Admin\AppData\Local\Temp\dummy.bin.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Windows\SysWOW64\cmd.execmd.exe /d /c bddveik.bat 30433364492⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\fkxyeofqgyi.exefkxyeofqgyi.exe llmoqqgyde.dat 30433364493⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
PID:2736
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
139B
MD56d473c3e20621625bfdea4f5199dca47
SHA1c4d12b1aeec0bc2d30e3fccff4db43316697c235
SHA2569471151eed557047dab8eeb4c4bc5b8fb582a5e1c321c84e0186fbc04d68debb
SHA512331ae811591a7345fbe6d58bbaa9bb22876a3a336a41c9a36a67f1473fd53e80e0f480dde9294e615e1865856f4b8c358c84edc065a873b36f6723a9438f96af
-
Filesize
1B
MD569691c7bdcc3ce6d5d8a1361f22d04ac
SHA1c63ae6dd4fc9f9dda66970e827d13f7c73fe841c
SHA25608f271887ce94707da822d5263bae19d5519cb3614e0daedc4c7ce5dab7473f1
SHA512253405e03b91441a6dd354a9b72e040068b1bfe10e83eb1a64a086c05525d8ccae2bf09130c624af50d55c3522a4fbb7c18cfc8dd843e5f4801d9ad2b5164b12
-
Filesize
3B
MD5158b365b9eedcfaf539f5dedfd82ee97
SHA1529f5d61ac99f60a8e473368eff1b32095a3e2bf
SHA25639561f8af034137905f14ca7fd5a2c891bc12982f3f8ef2271e75e93433ffa90
SHA512a1b231c2e6af432ee7df82e00d568819e12149af707d4c4fdd018b38cc4f9761062c5b7e497bd1b67e466b89e391520b88bf13f18c8b9ff646d82df740c05c09
-
Filesize
33B
MD5500ba63e2664798939744b8a8c9be982
SHA154743a77e4186cb327b803efb1ef5b3d4ac163ce
SHA2564ebc21177ee9907f71a1641a0482603ced98e9d43389cac0ffb0b59f7343eeba
SHA5129992b70de5867e2a00aff4f79c37ba71e827cbb104c192ebd4a553f91ae06a5b235f34e65d9d1145591c147e9e6726146cb92171945aa67b8f3294116a223fe7
-
Filesize
5.2MB
MD5a452946137958e0cee844310f9e9fa7c
SHA18cf21ae4d1d764154048a02fb49412ef94094485
SHA256088a5d04f2f6d6820bf1a6a390d9c0e00f88896c932848f0c97912b861479bb9
SHA512ef3759e134c9b0eaaf300a57d335131faa91337497f572ef7eb1058e498a071d1741a6e0947ca9e95fe92b1ca163814ce6d1d706ad5ab010d47d18038b26beaa
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
936KB
MD559d39fabbb300e7f0e7630bfec8fad18
SHA174b61452ee9134b56a269635d1a469e8902b509a
SHA25647c095775b069a75d938a6f71e6496b8e1557c416bfdb6d90792df17dcfb80c0
SHA512008e47c31f8bc9c41365734c902146b6f58352c463c02b221a70226eff8593a3db6d24691337c7e0ca83d5063b2e24fedb3190bd770fd01ae2df01c6b50e6d98
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7
-
Filesize
5.2MB
MD5812d99a3d89b8de1b866ac960031e3df
SHA16817df1da376e8f6e68fd1ad06d78f02406b6e19
SHA2569c5898b1b354b139794f10594e84e94e991971a54d179b2e9f746319ffac56aa
SHA51285f72df2e679da3f337fc162ce3023d7d078c4433b49d3f4a16946fb0d2fdbadf5c736ff76e47bcdf920d5d90e05bf7f66ec9ca9fbe3f1d620cf33c046d857e7