Analysis
-
max time kernel
118s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
11/10/2023, 20:35
Static task
static1
Behavioral task
behavioral1
Sample
x9483249.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
x9483249.exe
Resource
win10v2004-20230915-en
General
-
Target
x9483249.exe
-
Size
854KB
-
MD5
e1ac615b01b648eea9d3b6c5c564d40a
-
SHA1
5c83cea92706aaf7fb2b9da4f1b210d9444d020a
-
SHA256
5363121da91f4477771e22092f4c29a0470f24a84613223d3c69747d2b8e48a9
-
SHA512
fcbd9adc0840c1ff574f5e9401b407510192ef45184ed6131c7089ae963c96bcf48879c88380d9f4b06b22183356945938cec0c1096d50446753f7cc6812e152
-
SSDEEP
12288:SMryy90rwvnT4eFdtutlnAi+vwMo3m67T7p1zIgaeVopOq3+dvKvgDsTmYxCvYNh:kyySTbjAmoMczz6pBWJDsTmRvY/v
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 3048 x7496497.exe 2776 x7101542.exe 2824 g6544546.exe -
Loads dropped DLL 11 IoCs
pid Process 2704 x9483249.exe 3048 x7496497.exe 3048 x7496497.exe 2776 x7101542.exe 2776 x7101542.exe 2776 x7101542.exe 2824 g6544546.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" x9483249.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7496497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x7101542.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2824 set thread context of 3068 2824 g6544546.exe 30 -
Program crash 2 IoCs
pid pid_target Process procid_target 2880 2824 WerFault.exe 29 2688 3068 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 2704 wrote to memory of 3048 2704 x9483249.exe 27 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 3048 wrote to memory of 2776 3048 x7496497.exe 28 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2776 wrote to memory of 2824 2776 x7101542.exe 29 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 2824 wrote to memory of 3068 2824 g6544546.exe 30 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 2824 wrote to memory of 2880 2824 g6544546.exe 31 PID 3068 wrote to memory of 2688 3068 AppLaunch.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\x9483249.exe"C:\Users\Admin\AppData\Local\Temp\x9483249.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7496497.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7496497.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7101542.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x7101542.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6544546.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\g6544546.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3068 -s 2686⤵
- Program crash
PID:2688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2725⤵
- Loads dropped DLL
- Program crash
PID:2880
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
580KB
MD54f00ad9becc8066345def9af48e228af
SHA1989b098aa8bc41312b368646bcaf34b5d8e219cd
SHA256310b208c0a53a29552ab36f07135ea7fc901e3b8ae093c8cdcbbe3698c9a73ad
SHA512855915153f9acb1ef45e7f335cc5957c6d68f6d47ab7beda7af08d3a5cd205767689f704742ce7d6997503bf283fba4acbfa943fbff3a6f9a1fb131cec5f503c
-
Filesize
580KB
MD54f00ad9becc8066345def9af48e228af
SHA1989b098aa8bc41312b368646bcaf34b5d8e219cd
SHA256310b208c0a53a29552ab36f07135ea7fc901e3b8ae093c8cdcbbe3698c9a73ad
SHA512855915153f9acb1ef45e7f335cc5957c6d68f6d47ab7beda7af08d3a5cd205767689f704742ce7d6997503bf283fba4acbfa943fbff3a6f9a1fb131cec5f503c
-
Filesize
404KB
MD50ba3cbe0d4f9f6170b01bfc9f9570168
SHA1d6bb8f8ef82ade56a7f499c3b8f8e42db3bccdaa
SHA25672b5aeca9116a0a189ac18a9f40edd722dacc4d580043e7af3493ef10d4827f0
SHA512dfc4e51d57499b25f6a327c48bf3d9b1d0d796f904903c4c2d644c2f237a234b5b526ed3a9c8ab0801b465d8fbc64dce506d9a8c613adc41bc95ae292c42f8f1
-
Filesize
404KB
MD50ba3cbe0d4f9f6170b01bfc9f9570168
SHA1d6bb8f8ef82ade56a7f499c3b8f8e42db3bccdaa
SHA25672b5aeca9116a0a189ac18a9f40edd722dacc4d580043e7af3493ef10d4827f0
SHA512dfc4e51d57499b25f6a327c48bf3d9b1d0d796f904903c4c2d644c2f237a234b5b526ed3a9c8ab0801b465d8fbc64dce506d9a8c613adc41bc95ae292c42f8f1
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
580KB
MD54f00ad9becc8066345def9af48e228af
SHA1989b098aa8bc41312b368646bcaf34b5d8e219cd
SHA256310b208c0a53a29552ab36f07135ea7fc901e3b8ae093c8cdcbbe3698c9a73ad
SHA512855915153f9acb1ef45e7f335cc5957c6d68f6d47ab7beda7af08d3a5cd205767689f704742ce7d6997503bf283fba4acbfa943fbff3a6f9a1fb131cec5f503c
-
Filesize
580KB
MD54f00ad9becc8066345def9af48e228af
SHA1989b098aa8bc41312b368646bcaf34b5d8e219cd
SHA256310b208c0a53a29552ab36f07135ea7fc901e3b8ae093c8cdcbbe3698c9a73ad
SHA512855915153f9acb1ef45e7f335cc5957c6d68f6d47ab7beda7af08d3a5cd205767689f704742ce7d6997503bf283fba4acbfa943fbff3a6f9a1fb131cec5f503c
-
Filesize
404KB
MD50ba3cbe0d4f9f6170b01bfc9f9570168
SHA1d6bb8f8ef82ade56a7f499c3b8f8e42db3bccdaa
SHA25672b5aeca9116a0a189ac18a9f40edd722dacc4d580043e7af3493ef10d4827f0
SHA512dfc4e51d57499b25f6a327c48bf3d9b1d0d796f904903c4c2d644c2f237a234b5b526ed3a9c8ab0801b465d8fbc64dce506d9a8c613adc41bc95ae292c42f8f1
-
Filesize
404KB
MD50ba3cbe0d4f9f6170b01bfc9f9570168
SHA1d6bb8f8ef82ade56a7f499c3b8f8e42db3bccdaa
SHA25672b5aeca9116a0a189ac18a9f40edd722dacc4d580043e7af3493ef10d4827f0
SHA512dfc4e51d57499b25f6a327c48bf3d9b1d0d796f904903c4c2d644c2f237a234b5b526ed3a9c8ab0801b465d8fbc64dce506d9a8c613adc41bc95ae292c42f8f1
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689
-
Filesize
396KB
MD5bc9d594385ba170a78f2ac71f82737b6
SHA1090b2ed7f0f72f1f24fe7b02f492150edfea2c6a
SHA2563482771ad5605e1fd2c30d14b9b33f42eda3e09e139a702506e2f6ee6ff2d5cc
SHA51219b5cb5ddc27851a139f5e029a0ef9e819e615407dc959c54a08a855fd0847ebb0f234623a2dde0c6b7a3e5898721331d9d92794698354a95b9e426906a26689