Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 04:59
Static task
static1
Behavioral task
behavioral1
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
Resource
win10v2004-20230915-en
General
-
Target
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe
-
Size
1.0MB
-
MD5
8041d9fab3740fbaa0ff927a0908e073
-
SHA1
54e32969e2666415cc1c02c45ad70e3f90d7d938
-
SHA256
a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a
-
SHA512
ba80f1d90cd879de0866f5cd5834b0c0122c59c41b3062b5ce30ff954d5bb5600e968fda278c0dd5343166c83a779ed4fcfd085b5149de4434398c7c97b774fa
-
SSDEEP
24576:MymXcVy4JB5oYHDPySOw7yVjwp2eok+RIWGIT6hjpX8T/JSJWe:7mXcVjXoE7yZwvokcuITEjpX8T/Jr
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2732 x9498095.exe 3044 x4203749.exe 2712 x6052541.exe 2900 g2922257.exe -
Loads dropped DLL 13 IoCs
pid Process 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 2732 x9498095.exe 2732 x9498095.exe 3044 x4203749.exe 3044 x4203749.exe 2712 x6052541.exe 2712 x6052541.exe 2712 x6052541.exe 2900 g2922257.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe 2420 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4203749.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6052541.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x9498095.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2900 set thread context of 2492 2900 g2922257.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2420 2900 WerFault.exe 31 2520 2492 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2080 wrote to memory of 2732 2080 a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe 28 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 2732 wrote to memory of 3044 2732 x9498095.exe 29 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 3044 wrote to memory of 2712 3044 x4203749.exe 30 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2712 wrote to memory of 2900 2712 x6052541.exe 31 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2492 2900 g2922257.exe 33 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2492 wrote to memory of 2520 2492 AppLaunch.exe 35 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34 PID 2900 wrote to memory of 2420 2900 g2922257.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe"C:\Users\Admin\AppData\Local\Temp\a877a070ff8a9e1c62b6fb8d21564e79921e5ff5369ede2733fc51cd136cfa6a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9498095.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x9498095.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4203749.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4203749.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6052541.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6052541.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2922257.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g2922257.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2687⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2420
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
933KB
MD5594db721d818ae14b5cf922137b1d197
SHA1b021e4ef665ea284420049bf560b7d6ee7ba0a9f
SHA2560f52b6f8e5a106a74c87c7e2ff87ceafedb293e134a861096e4ade82c8258181
SHA512ca30235989933e3c1fe1cb41453b40012800f6e0278aad6882b8709c97e22c3a04849f97fddba99c89a75914298b31076d01a381a89f40ce4695a35129b2284d
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
629KB
MD5336f5dda345a54eb8af5bcdba2281f71
SHA17c696f67ab121bb6df86b621cf9af35e2bb8cec5
SHA2565a75d9facb006cafefcb26853f48dccd32a419669fb18ddd6280fdf60b5c5a9e
SHA512b9e7f8f3ab4a7d093dc779bdcc115dd245219a230f440f639e050829727566e9f0a9e11bf210111e3f9a4649a470b1bd0ce0c4fe455da683bf378758a258a7c9
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
443KB
MD528f47bfef36efdd0cffe1f03e6b7d846
SHA1db7821065179a48622407cdfd35c66cfbb4aff25
SHA2565bfa89d8ebdb489934185553aac9db8705a6c19037204873d54ba6c60fba28fa
SHA5128e1988404c1b49c60af772f0e7cf93903996f86693c28f5c3cef4d403c1c23d884b2d8de4e8187751c3b9e043c33adb6a0c876fe66525bdf4585d84284f49fb8
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9
-
Filesize
700KB
MD56d5f2e27cec197f17bf0e96d7a72d423
SHA1f7feb2636e75e4ed98d1a2cc1c986a325c0feeff
SHA2569ff147ff88bdaadd0ed03f0a0c159d4d9ad35c8a7942d87467905b73459a361e
SHA512bc009d3a200d0aa7e2422f3c20797dafb2dfbea3c35e4fb7e731394312243442b997d57bf3928c9a864f6cc9be3ac93b6d99d0fcba39d53230e5536b2dab65d9