Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:06
Static task
static1
Behavioral task
behavioral1
Sample
9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe
Resource
win10v2004-20230915-en
General
-
Target
9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe
-
Size
955KB
-
MD5
8dc6a8e542ab8638512b8766ed149581
-
SHA1
b7ef127e5d140538e3cf7b34dfb07b1855a88357
-
SHA256
9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316
-
SHA512
acae9b102c4a3aaf7dd8feb08ae931b35183f15387484c74698f005cafc83cb14651c334f0df01f5f3e9fc891836d47d65e41b0fbf8185c9f14e7c47335b6778
-
SSDEEP
24576:xyecDnJSYr9UwhvlDQVLSCB23m6q0hrmj:kecn4Yr/vQVLSC02r
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2172 x5631582.exe 2760 x6684912.exe 2600 x5545245.exe 2804 g0335249.exe -
Loads dropped DLL 12 IoCs
pid Process 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 2172 x5631582.exe 2172 x5631582.exe 2760 x6684912.exe 2760 x6684912.exe 2600 x5545245.exe 2600 x5545245.exe 2804 g0335249.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe 3008 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x5631582.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6684912.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5545245.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2804 set thread context of 2492 2804 g0335249.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 3008 2804 WerFault.exe 30 1676 2492 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2832 wrote to memory of 2172 2832 9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe 27 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2172 wrote to memory of 2760 2172 x5631582.exe 28 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2760 wrote to memory of 2600 2760 x6684912.exe 29 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2600 wrote to memory of 2804 2600 x5545245.exe 30 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2804 wrote to memory of 2492 2804 g0335249.exe 33 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 1676 2492 AppLaunch.exe 35 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34 PID 2804 wrote to memory of 3008 2804 g0335249.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe"C:\Users\Admin\AppData\Local\Temp\9a5c74b2d636a52d17290a57ef86f729c4a918bbd340823b7f7cd0b3e501a316.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x5631582.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6684912.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5545245.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0335249.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2687⤵
- Program crash
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2804 -s 2726⤵
- Loads dropped DLL
- Program crash
PID:3008
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
853KB
MD54b0a1aed204fd7d50ecfe893a9f57e9b
SHA1ba99e680f585116c705086c3ba4b6685fa72d5e4
SHA2565c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1
SHA5123b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135
-
Filesize
853KB
MD54b0a1aed204fd7d50ecfe893a9f57e9b
SHA1ba99e680f585116c705086c3ba4b6685fa72d5e4
SHA2565c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1
SHA5123b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135
-
Filesize
588KB
MD5745201dc3d5b51fbd50b5544efa0d71d
SHA1f027eb6e4e72be81fc2ec207376023c98ccc9a3f
SHA256f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456
SHA5124342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd
-
Filesize
588KB
MD5745201dc3d5b51fbd50b5544efa0d71d
SHA1f027eb6e4e72be81fc2ec207376023c98ccc9a3f
SHA256f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456
SHA5124342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd
-
Filesize
403KB
MD50fd72b93457bca2da50b05dedf205bae
SHA121b69153a7b261555cf7f6910b0035ec36d69432
SHA256d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc
SHA512303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a
-
Filesize
403KB
MD50fd72b93457bca2da50b05dedf205bae
SHA121b69153a7b261555cf7f6910b0035ec36d69432
SHA256d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc
SHA512303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
853KB
MD54b0a1aed204fd7d50ecfe893a9f57e9b
SHA1ba99e680f585116c705086c3ba4b6685fa72d5e4
SHA2565c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1
SHA5123b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135
-
Filesize
853KB
MD54b0a1aed204fd7d50ecfe893a9f57e9b
SHA1ba99e680f585116c705086c3ba4b6685fa72d5e4
SHA2565c2ed10d60a894493a747855a300aacce90fcdf951f91e1790bc1165bc4380f1
SHA5123b1c17db40b1c519f38b8a7ff16be93a43dd8f015d35f4db9372160d134763251cbb3753762af042041622232528fad269b57b44b9a25b1d01ea01feb8b20135
-
Filesize
588KB
MD5745201dc3d5b51fbd50b5544efa0d71d
SHA1f027eb6e4e72be81fc2ec207376023c98ccc9a3f
SHA256f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456
SHA5124342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd
-
Filesize
588KB
MD5745201dc3d5b51fbd50b5544efa0d71d
SHA1f027eb6e4e72be81fc2ec207376023c98ccc9a3f
SHA256f7d24122421d7724d99135ed3d3f400ea6de94c7276a2e8c9a9541e1dc870456
SHA5124342c4898bb7abc4daa2c5fb2b6b7dab7ae111b94d3ac6e752e35558a457af4ccaad548cb6a6d13e821d74b280cea462710f65c938b678342ea04447e9ee30bd
-
Filesize
403KB
MD50fd72b93457bca2da50b05dedf205bae
SHA121b69153a7b261555cf7f6910b0035ec36d69432
SHA256d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc
SHA512303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a
-
Filesize
403KB
MD50fd72b93457bca2da50b05dedf205bae
SHA121b69153a7b261555cf7f6910b0035ec36d69432
SHA256d34a32fe710adb927cc23d2e34e253584eb044db436c93d0038b5e74bc5d23cc
SHA512303bc9b92828d492400e87d20087aedd95a56c35729050d033307d85c7c42f77b81de360559757ac6d44746835c4a90e3135f34db9444cc8a79f60847b32fc4a
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2
-
Filesize
378KB
MD5a1cbdcf4d9e783f651dd19bf3dc703a7
SHA13c2c4acfb33fd35f6189d4984efb2f04d8b82c71
SHA25638979e1367c2538d4c9229e205ebac07a78e67a8449f1e5943ec13d3e0fcaa45
SHA512a6ac0fc420a54a407f1ddd5022b93220dd29e4478b5cd0cee810399a18e5f30a46806d0a622711ef5c3569523e169e3987f5093f5c27882ac06ab1da4af68af2