Analysis
-
max time kernel
121s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 02:23
Static task
static1
Behavioral task
behavioral1
Sample
12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe
Resource
win10v2004-20230915-en
General
-
Target
12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe
-
Size
937KB
-
MD5
99326f6cd19b52665cf45778936ef46a
-
SHA1
f2926ed54c015c3f704e51262c279c390b3c4337
-
SHA256
12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a
-
SHA512
c1d1bdc435f67631fec6520e6b49fe74119c4a03605115e6ec334f3c62b6714977deea759df8cf1209d74e75bfa6a99cc6db2f7274b66b4656ac8525979ad9ba
-
SSDEEP
24576:Vys31TYxce5KotI3+GZVobgU1oMLMNmInnrAZeGaW:ws3Cxc+7K3+ibU1oMYQInF
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1212 x5038141.exe 2648 x3129346.exe 2756 x6613552.exe 2652 g1366674.exe -
Loads dropped DLL 12 IoCs
pid Process 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 1212 x5038141.exe 1212 x5038141.exe 2648 x3129346.exe 2648 x3129346.exe 2756 x6613552.exe 2756 x6613552.exe 2652 g1366674.exe 2584 WerFault.exe 2584 WerFault.exe 2584 WerFault.exe 2584 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5038141.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x3129346.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6613552.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2652 set thread context of 2256 2652 g1366674.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2584 2652 WerFault.exe 31 1528 2256 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 2320 wrote to memory of 1212 2320 12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe 28 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 1212 wrote to memory of 2648 1212 x5038141.exe 29 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2648 wrote to memory of 2756 2648 x3129346.exe 30 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2756 wrote to memory of 2652 2756 x6613552.exe 31 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2636 2652 g1366674.exe 32 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2256 2652 g1366674.exe 33 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2652 wrote to memory of 2584 2652 g1366674.exe 34 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35 PID 2256 wrote to memory of 1528 2256 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe"C:\Users\Admin\AppData\Local\Temp\12b1e7745c9dfa9d8ca3e54bc336f92a2fdde96fd1b2900cb15cbada0d55aa3a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5038141.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x3129346.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6613552.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1366674.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2636
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 2687⤵
- Program crash
PID:1528
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2584
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
835KB
MD560029ce4304d96e72149337e00ed127b
SHA1c28460cd1ccadd7875411188b1894983dc893858
SHA25615c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518
SHA512a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b
-
Filesize
835KB
MD560029ce4304d96e72149337e00ed127b
SHA1c28460cd1ccadd7875411188b1894983dc893858
SHA25615c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518
SHA512a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b
-
Filesize
570KB
MD5e44e28ebffb17318d1baa57f98e95882
SHA12bc6ee43ad644119c78121b8935de0a1af862f21
SHA256e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c
SHA5128468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d
-
Filesize
570KB
MD5e44e28ebffb17318d1baa57f98e95882
SHA12bc6ee43ad644119c78121b8935de0a1af862f21
SHA256e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c
SHA5128468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d
-
Filesize
394KB
MD5455ed6a2d8241a0562a6ad9a113affb5
SHA1bf94733ae916952cb9e6c8cd95705726b334fc3a
SHA25699d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd
SHA512a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691
-
Filesize
394KB
MD5455ed6a2d8241a0562a6ad9a113affb5
SHA1bf94733ae916952cb9e6c8cd95705726b334fc3a
SHA25699d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd
SHA512a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
835KB
MD560029ce4304d96e72149337e00ed127b
SHA1c28460cd1ccadd7875411188b1894983dc893858
SHA25615c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518
SHA512a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b
-
Filesize
835KB
MD560029ce4304d96e72149337e00ed127b
SHA1c28460cd1ccadd7875411188b1894983dc893858
SHA25615c2becf6b39247230086067f46516b6c5dedef2c75d3cfecdfa403226166518
SHA512a6792ab9d7c4222f31be116b1c8159b378bd4b1f0ae3246e9264e18327684e990d183d6e3a1310e980dc84a73f195e4fbdfb290aa6eaaa774b5d7724776fcb6b
-
Filesize
570KB
MD5e44e28ebffb17318d1baa57f98e95882
SHA12bc6ee43ad644119c78121b8935de0a1af862f21
SHA256e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c
SHA5128468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d
-
Filesize
570KB
MD5e44e28ebffb17318d1baa57f98e95882
SHA12bc6ee43ad644119c78121b8935de0a1af862f21
SHA256e4ff55cdac2d881478bd81cd46a5a10acba7f374d0fd47f335e0829fdab87b7c
SHA5128468734f52932798a077be291b2eade3a9a8fecf6f70b78c948cb409fc8aa5effc10fa8d0ea2adea8d751285ad6bd56334b0c6374f7c0f265860e1d6b277b17d
-
Filesize
394KB
MD5455ed6a2d8241a0562a6ad9a113affb5
SHA1bf94733ae916952cb9e6c8cd95705726b334fc3a
SHA25699d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd
SHA512a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691
-
Filesize
394KB
MD5455ed6a2d8241a0562a6ad9a113affb5
SHA1bf94733ae916952cb9e6c8cd95705726b334fc3a
SHA25699d488178bc5d3ccb01761cbd0e522ad97da43738f39dde6a93f4f2ff2d784cd
SHA512a89a9a2ad3055081ae1e135bb9991dace6869a27c66124afe81e69f77490d8969664ee5c06758241861b988dcfa3988b384efe6e23786f8d5c92dac001f31691
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328
-
Filesize
365KB
MD584ee06973f7cf3f386279b0c256dbe77
SHA182865ac8c9497e1562bd5998190faa179a05972f
SHA25634bb933a9235d7d10c18846c0a1a14130cb5d686e6dade98d799ae50dabe8e3c
SHA5127b29a9bcbadbb2f5d3536a255795ef30a92f4c4b67300437050a14527d85b0af6b49eeca7f0df33f2657e02daea149a0b51351eb417a7b98247222edfd1d9328