Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe
Resource
win10v2004-20230915-en
General
-
Target
321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe
-
Size
1.0MB
-
MD5
5b8f378f2dc2830855dc401ac2d65315
-
SHA1
8544709d39146ec64b9a0d2c9df6c4eeda63f3f4
-
SHA256
321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27
-
SHA512
c599d4268d8ab190bb664597dcb28640db760b9dc31efd74b0683468a3ea3645a5fb846f93ff390573b2faf004d792006a893f157958e5fdd542681239989f78
-
SSDEEP
24576:qyyTAotI+thHX1L81DGHFjJU6PfM50jHL:xeAotIYHXV81DGljJTPfIY
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1756 x1657369.exe 2240 x0119350.exe 2368 x4854368.exe 2712 g2368368.exe -
Loads dropped DLL 13 IoCs
pid Process 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 1756 x1657369.exe 1756 x1657369.exe 2240 x0119350.exe 2240 x0119350.exe 2368 x4854368.exe 2368 x4854368.exe 2368 x4854368.exe 2712 g2368368.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe 2924 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0119350.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4854368.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x1657369.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2712 set thread context of 2764 2712 g2368368.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 2924 2712 WerFault.exe 31 3000 2764 WerFault.exe 35 -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1188 wrote to memory of 1756 1188 321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe 28 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 1756 wrote to memory of 2240 1756 x1657369.exe 29 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2240 wrote to memory of 2368 2240 x0119350.exe 30 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2368 wrote to memory of 2712 2368 x4854368.exe 31 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 2928 2712 g2368368.exe 33 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 1676 2712 g2368368.exe 34 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2764 2712 g2368368.exe 35 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36 PID 2764 wrote to memory of 3000 2764 AppLaunch.exe 37 PID 2712 wrote to memory of 2924 2712 g2368368.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe"C:\Users\Admin\AppData\Local\Temp\321370d84adcbf458700e808dd3f45a626a6b4c11ded2c9b1f8fb8c7e5358f27.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x1657369.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0119350.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4854368.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2368368.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:2928
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1676
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2764 -s 2687⤵
- Program crash
PID:3000
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2886⤵
- Loads dropped DLL
- Program crash
PID:2924
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD550d6f12cc8ae6ad73dd712bf8b8fcc90
SHA1b47569cf57e55df237c2c54e54b43da1321b19be
SHA2561c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e
SHA5124d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359
-
Filesize
932KB
MD550d6f12cc8ae6ad73dd712bf8b8fcc90
SHA1b47569cf57e55df237c2c54e54b43da1321b19be
SHA2561c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e
SHA5124d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359
-
Filesize
628KB
MD59bca544fa0fab622e8837d7c4bafa89f
SHA1aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95
SHA2568059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f
SHA5126bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7
-
Filesize
628KB
MD59bca544fa0fab622e8837d7c4bafa89f
SHA1aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95
SHA2568059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f
SHA5126bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7
-
Filesize
443KB
MD5fb2e9b78d253c4943fb002440dc5dca5
SHA1937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b
SHA25681753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c
SHA5120607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e
-
Filesize
443KB
MD5fb2e9b78d253c4943fb002440dc5dca5
SHA1937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b
SHA25681753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c
SHA5120607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
932KB
MD550d6f12cc8ae6ad73dd712bf8b8fcc90
SHA1b47569cf57e55df237c2c54e54b43da1321b19be
SHA2561c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e
SHA5124d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359
-
Filesize
932KB
MD550d6f12cc8ae6ad73dd712bf8b8fcc90
SHA1b47569cf57e55df237c2c54e54b43da1321b19be
SHA2561c1c785c09e541b36ef887db54f80147e795ff8d112d54bc2de2de49b86cf19e
SHA5124d53b1e0d9c5a6479ae9fd9ab1dade7ad189806a10332e15d522923cea21f46c9b7914dfd75c8375431388051b933553934113e34daefc2b8dfe27636f14e359
-
Filesize
628KB
MD59bca544fa0fab622e8837d7c4bafa89f
SHA1aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95
SHA2568059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f
SHA5126bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7
-
Filesize
628KB
MD59bca544fa0fab622e8837d7c4bafa89f
SHA1aa9cfc7d1a76024e4f0ad942c03bd602fdd42e95
SHA2568059d8f76eb351becc95756679d2f140749f813ad2207bb0b1660fd7118a305f
SHA5126bacd704714859ad3ffd4652bc0b1dc3708470b675dd8960ba1832e37ba90605481e53f5f6a6b63411d626f7de29bce6af4fac70346cdb775cf17f2c85f3dfd7
-
Filesize
443KB
MD5fb2e9b78d253c4943fb002440dc5dca5
SHA1937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b
SHA25681753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c
SHA5120607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e
-
Filesize
443KB
MD5fb2e9b78d253c4943fb002440dc5dca5
SHA1937a5cc3237a5c35d45ef466dd8f7d1dbfa8405b
SHA25681753d3219a058730be2846dac1d5a951eb2d53211e8eda66f476c9b9a23d27c
SHA5120607b4b50c933fb5d63d445dd602556f47aa8ef008fbf47cfc7e4b6bc6660f04d298ddaf37281ba1b66de4d1ba5661a212e0df9e86fc41a430218df7f5e9c65e
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea
-
Filesize
700KB
MD53f8df8626cd836b1b05563746ca282da
SHA1826b186f9b1573ce97cd7f04708177ce75dd9afb
SHA25662055aa8362f2584fcf25d80a0e6f1baf35ce9bc4030702793098c7872699d3e
SHA512b4e9e6ee8416ba841bbc1b1814942d5b6af38b3c7e506c8a1c59b856613a0fc1e48532f80a5f473286a78ea5f189678275f46888cbe985bea32e3cebeb1f5eea