Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 03:33
Static task
static1
Behavioral task
behavioral1
Sample
627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe
Resource
win10v2004-20230915-en
General
-
Target
627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe
-
Size
937KB
-
MD5
f4858baad787af8258f79a1b03118837
-
SHA1
5ae3fa000cc70d0648656e580a535b5400e763d5
-
SHA256
627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1
-
SHA512
9d66d396fae787c1b27513e59a4c81ebf3570217beb398ee26dcee9770bb80fd760181032d03788440fbfce89c2356c6a7ae9911e6a69ed84db1761dc7c3cd0c
-
SSDEEP
12288:8Mrzy90j6pp4VcjV216MZxy2QS6m4PppufEv3S2MFrY5JDFi3Z/zXb4CNqzg+gql:nyfsyW6AaLerolFi3ZjcClGB+H9H4
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1752 x7817427.exe 2076 x5323519.exe 2684 x9405189.exe 2832 g1419692.exe -
Loads dropped DLL 12 IoCs
pid Process 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 1752 x7817427.exe 1752 x7817427.exe 2076 x5323519.exe 2076 x5323519.exe 2684 x9405189.exe 2684 x9405189.exe 2832 g1419692.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe 2728 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7817427.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x5323519.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x9405189.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2832 set thread context of 2616 2832 g1419692.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 2728 2832 WerFault.exe 31 2456 2616 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1740 wrote to memory of 1752 1740 627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe 28 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 1752 wrote to memory of 2076 1752 x7817427.exe 29 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2076 wrote to memory of 2684 2076 x5323519.exe 30 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2684 wrote to memory of 2832 2684 x9405189.exe 31 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2616 2832 g1419692.exe 32 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2832 wrote to memory of 2728 2832 g1419692.exe 33 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34 PID 2616 wrote to memory of 2456 2616 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe"C:\Users\Admin\AppData\Local\Temp\627d222411b5c687598c9defff847a5c79cefb2e9229554c96f3ecee3a7e63f1.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7817427.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x5323519.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x9405189.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g1419692.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2616 -s 2687⤵
- Program crash
PID:2456
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:2728
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
835KB
MD507eb55b2d1cc5206ff31929c62ad18eb
SHA11ca53d5236ecece683c2b39a74d74c657bbde4bc
SHA25663862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a
SHA5127fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef
-
Filesize
835KB
MD507eb55b2d1cc5206ff31929c62ad18eb
SHA11ca53d5236ecece683c2b39a74d74c657bbde4bc
SHA25663862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a
SHA5127fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef
-
Filesize
570KB
MD53f8cc0faafa6b6d57a221b7404f09052
SHA1ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a
SHA256cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6
SHA512a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20
-
Filesize
570KB
MD53f8cc0faafa6b6d57a221b7404f09052
SHA1ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a
SHA256cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6
SHA512a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20
-
Filesize
394KB
MD5e1785f79a70e49b22e127c1707459b3d
SHA19cda1c3f0abd20cd1c325080f8d9006f483f0d1a
SHA2563f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719
SHA512c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46
-
Filesize
394KB
MD5e1785f79a70e49b22e127c1707459b3d
SHA19cda1c3f0abd20cd1c325080f8d9006f483f0d1a
SHA2563f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719
SHA512c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
835KB
MD507eb55b2d1cc5206ff31929c62ad18eb
SHA11ca53d5236ecece683c2b39a74d74c657bbde4bc
SHA25663862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a
SHA5127fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef
-
Filesize
835KB
MD507eb55b2d1cc5206ff31929c62ad18eb
SHA11ca53d5236ecece683c2b39a74d74c657bbde4bc
SHA25663862002e5fbadc363ef6ef434f59a36f25cb22d8fd7c984c84fcc57d8c2046a
SHA5127fdfdfcd0a2a21b458a1281646c8606b2a3f23d536853bd4888d8cd7f5601f2f9f3f32f1c2491047dc135e039024d5f2292c7579bf38f0f5d5b77e2c821a7bef
-
Filesize
570KB
MD53f8cc0faafa6b6d57a221b7404f09052
SHA1ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a
SHA256cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6
SHA512a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20
-
Filesize
570KB
MD53f8cc0faafa6b6d57a221b7404f09052
SHA1ddfd5df91940fdc1917e4d8a94195b65b8e2fa2a
SHA256cf0dfa1b27814f4ad2a7a6fe27ff0ffb10638eafaa394a812fb262f16e80dac6
SHA512a816df437d4f78f56937d45091a6e515c953262ad25f0d2f2735670ba8f9090dd85c321fc1b5b62d9be3bb38d1abfd518bace8ab8d37428018239a2be2911c20
-
Filesize
394KB
MD5e1785f79a70e49b22e127c1707459b3d
SHA19cda1c3f0abd20cd1c325080f8d9006f483f0d1a
SHA2563f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719
SHA512c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46
-
Filesize
394KB
MD5e1785f79a70e49b22e127c1707459b3d
SHA19cda1c3f0abd20cd1c325080f8d9006f483f0d1a
SHA2563f6b83dd625f30d6f140a797f2ab336cc687675b7569daa7a10eb405260dd719
SHA512c995ad645d1dcf7d6c0fd3255cb6fb32c55b61dd29115015066aa2723fd855a2b95b84368b5ce77e95cae1da328ed00c7afd2f1f5217460818393f27fedf0a46
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff
-
Filesize
365KB
MD5ff0b29f0bedefbbd25834e7b1f2ad95c
SHA11ea758e84d89c639d92305f73607a0d8d32054c8
SHA256d512322421953267db38b7cfb9a1993456fa1421558612d07c96a3b9c4000b5f
SHA512a599e78739da02fec5599f748eebdce243fe2dedd1d99422228779068641cd228eda6e0426896af930ca7961517a6d0060849ff726b46d848d0a25fbb24faaff