Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:34
Static task
static1
Behavioral task
behavioral1
Sample
x3868327.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x3868327.exe
Resource
win10v2004-20230915-en
General
-
Target
x3868327.exe
-
Size
390KB
-
MD5
da9c07032bb8c10e67bf1087b6ad61a3
-
SHA1
073da228e78a4b21d687aac7b6dd468d2e338a57
-
SHA256
4df082db42dc215b33745e1c19ed1f34d4db4af07fc66087fae716cf2135881c
-
SHA512
bd1cb28e5fa2ab812e75359e562fd3f93dc35f434be62267cc8d92adb11639d009c0870cef363ed0affec0cb39b65343a2cfeb5c86bcc699b9665a90148d445d
-
SSDEEP
6144:K9y+bnr+Pp0yN90QEVDzZxEuDCV+azUs6MqgijV/Q3+bxNjZWV7LYI:7Mrby90/DzEuDrsxij6+VNja/z
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1720 g8640147.exe -
Loads dropped DLL 7 IoCs
pid Process 2976 x3868327.exe 2976 x3868327.exe 1720 g8640147.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe 2712 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x3868327.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1720 set thread context of 2852 1720 g8640147.exe 29 -
Program crash 2 IoCs
pid pid_target Process procid_target 2712 1720 WerFault.exe 28 2600 2852 WerFault.exe 29 -
Suspicious use of WriteProcessMemory 35 IoCs
description pid Process procid_target PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 2976 wrote to memory of 1720 2976 x3868327.exe 28 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 1720 wrote to memory of 2852 1720 g8640147.exe 29 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 2852 wrote to memory of 2600 2852 AppLaunch.exe 31 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30 PID 1720 wrote to memory of 2712 1720 g8640147.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\x3868327.exe"C:\Users\Admin\AppData\Local\Temp\x3868327.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\g8640147.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1720 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:2852 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2852 -s 2684⤵
- Program crash
PID:2600
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 2723⤵
- Loads dropped DLL
- Program crash
PID:2712
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e
-
Filesize
364KB
MD53a184aeb92fc87dc08af0d194786fb56
SHA16b92867b073f0ed1e23bcf16e828e951f8af006d
SHA2562c8331f36c99a08bb8c22074be4e8ae9b783d842645241a1b95bb2f145ab79cb
SHA5123e9e5c2d9d44ed7f4ca1147eef64fbbe157d50afaaa78aeb24ad1e5538d19d2ba914fdbfadbb58fee4abf6f29a4bf21b3b05d0108b4528ec49f0cd65deae8c4e