Analysis
-
max time kernel
169s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:54
Static task
static1
Behavioral task
behavioral1
Sample
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
Resource
win10v2004-20230915-en
General
-
Target
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe
-
Size
1.0MB
-
MD5
4c77a170f32fd3bdbd05377a1e17bd82
-
SHA1
36b4c1c8bd3014d92884e6f8e0c7de55cd63c5ec
-
SHA256
486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8
-
SHA512
5331f8c1c0c1161575f265444b5acb685af5d4d0af485eb059ae2d2426ebabbded68f40c7a1548116533754c4b5d77e991c849f02b87ada77a1d4a60001bb36a
-
SSDEEP
24576:/yB+ePuQ/7S4Z17W5YtICxhXHaRuGaXQf:Kke9zC5iIMH+Eg
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2676 x4541201.exe 2352 x6482044.exe 2516 x7197008.exe 1692 g2159128.exe -
Loads dropped DLL 13 IoCs
pid Process 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 2676 x4541201.exe 2676 x4541201.exe 2352 x6482044.exe 2352 x6482044.exe 2516 x7197008.exe 2516 x7197008.exe 2516 x7197008.exe 1692 g2159128.exe 3012 WerFault.exe 3012 WerFault.exe 3012 WerFault.exe 3012 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x7197008.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4541201.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6482044.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1692 set thread context of 1860 1692 g2159128.exe 32 -
Program crash 2 IoCs
pid pid_target Process procid_target 3012 1692 WerFault.exe 30 2976 1860 WerFault.exe 32 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2648 wrote to memory of 2676 2648 486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe 27 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2676 wrote to memory of 2352 2676 x4541201.exe 28 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2352 wrote to memory of 2516 2352 x6482044.exe 29 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 2516 wrote to memory of 1692 2516 x7197008.exe 30 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 1860 1692 g2159128.exe 32 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1692 wrote to memory of 3012 1692 g2159128.exe 33 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34 PID 1860 wrote to memory of 2976 1860 AppLaunch.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe"C:\Users\Admin\AppData\Local\Temp\486d802e6f6ffd2647f18868f7841ae7f1ff018adba25344a82a08acfbc7e0a8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4541201.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2676 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6482044.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x7197008.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2159128.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2687⤵
- Program crash
PID:2976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:3012
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD51f8cb501734a3c4b435833bddd8c047a
SHA1b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1
SHA256d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031
SHA5120ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f
-
Filesize
932KB
MD51f8cb501734a3c4b435833bddd8c047a
SHA1b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1
SHA256d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031
SHA5120ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f
-
Filesize
628KB
MD55a52cd501bd5949ed07943e5bba9eacb
SHA1872dd0e48ed629c25b7dfd7024e9947cb6618887
SHA256408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b
SHA51219cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14
-
Filesize
628KB
MD55a52cd501bd5949ed07943e5bba9eacb
SHA1872dd0e48ed629c25b7dfd7024e9947cb6618887
SHA256408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b
SHA51219cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14
-
Filesize
443KB
MD5033bf0754723e9bfcafede0fa2a6940c
SHA1404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a
SHA256c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6
SHA512811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a
-
Filesize
443KB
MD5033bf0754723e9bfcafede0fa2a6940c
SHA1404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a
SHA256c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6
SHA512811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
932KB
MD51f8cb501734a3c4b435833bddd8c047a
SHA1b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1
SHA256d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031
SHA5120ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f
-
Filesize
932KB
MD51f8cb501734a3c4b435833bddd8c047a
SHA1b36cfa6d3060d5f27e55c6a893841acc6c6ee0d1
SHA256d403acfb9efa6f07e0de2b7141da3b7b0123bfff89bc9c9a3ad1c5dfa41e7031
SHA5120ecaffbee321d132d04a5e0bd53c3f08244f513cc7c4629bf53b6f54054bb6548e42ddee943ff4b368951d6d83c9e1c953c9c4f434e560b4e6bb70e9fb0dba0f
-
Filesize
628KB
MD55a52cd501bd5949ed07943e5bba9eacb
SHA1872dd0e48ed629c25b7dfd7024e9947cb6618887
SHA256408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b
SHA51219cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14
-
Filesize
628KB
MD55a52cd501bd5949ed07943e5bba9eacb
SHA1872dd0e48ed629c25b7dfd7024e9947cb6618887
SHA256408dc9c90ccd7f73b54240c85de2948c3b5684d4e594b49cbd5b87ccd303d36b
SHA51219cc6680233cbca2184b5494a921b63c27d3600543286c73cee4d723d626f7a71a1a82fdcc727872b734b02016148904d8ae3daf32edad15ef63dba4d9fece14
-
Filesize
443KB
MD5033bf0754723e9bfcafede0fa2a6940c
SHA1404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a
SHA256c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6
SHA512811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a
-
Filesize
443KB
MD5033bf0754723e9bfcafede0fa2a6940c
SHA1404488e3b9fd71036ee29d81d93d8f8ce4a6ca2a
SHA256c27f7be4cadd24a35393a22f8d4f2640bbed6ce8130d792e183d0ad119b238d6
SHA512811c3c8af438ab39410c83176715ba6fab756595675d89f4527e1e0e83c50e69fc674e6c072535e9045e5333b02f9d65ab5a5f6dc800ac6e8bdd074d7273b40a
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5
-
Filesize
700KB
MD5c691e82760eac0752db2d5dbf44179c1
SHA18c404e7c09d23990c0982c43691e1b4af6531034
SHA256adb8b86aee4a26be5c24703643a903da0b0a7215273f3cefc34a5191ab02b1ae
SHA512d77230e701a1bc8fc9167b36b98011ff09384e66f79c270bb4255fa1a919eccf5ffd925dc65488ecb2d70cdc5460f1ca31ba5a8cf84ce0704228b76a550a85b5