Analysis
-
max time kernel
120s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 05:01
Static task
static1
Behavioral task
behavioral1
Sample
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
Resource
win10v2004-20230915-en
General
-
Target
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe
-
Size
1.0MB
-
MD5
5bea432079dad8cfe031acf040e7a995
-
SHA1
179c49408b68c57b7f8b3e394aedb25238ab1533
-
SHA256
cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a
-
SHA512
bcd8cccc91a517b8647625f95a50576864cac30d91f9d359422ec800aad833ec242d419c6827ccc17a9d26b85a0bd2db9b8eab17a5b00520a4a65f564be0a71a
-
SSDEEP
24576:HyuSR54Fwj6xtr6vqpVHvno2rtMRb/bj5H/TtzrY8:Sus5Ewj6xwvUVHvyBZ/Tt3Y
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1392 x7232108.exe 2596 x6112915.exe 2704 x6846176.exe 2660 g8921218.exe -
Loads dropped DLL 13 IoCs
pid Process 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 1392 x7232108.exe 1392 x7232108.exe 2596 x6112915.exe 2596 x6112915.exe 2704 x6846176.exe 2704 x6846176.exe 2704 x6846176.exe 2660 g8921218.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe 3000 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7232108.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x6112915.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x6846176.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2660 set thread context of 2924 2660 g8921218.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 3000 2660 WerFault.exe 31 2668 2924 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 2068 wrote to memory of 1392 2068 cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe 28 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 1392 wrote to memory of 2596 1392 x7232108.exe 29 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2596 wrote to memory of 2704 2596 x6112915.exe 30 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2704 wrote to memory of 2660 2704 x6846176.exe 31 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 2924 2660 g8921218.exe 33 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2660 wrote to memory of 3000 2660 g8921218.exe 34 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35 PID 2924 wrote to memory of 2668 2924 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe"C:\Users\Admin\AppData\Local\Temp\cbd401468253a8b9e9f335b9f23c251c05c3a47eaa229a157559a16d33d2e93a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7232108.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x6112915.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x6846176.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g8921218.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2687⤵
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:3000
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
933KB
MD547daf0f76da62686a01ad5d45937f50b
SHA1c532c56eba3cd18e7f9c2d06467033873c3772d1
SHA256b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36
SHA512bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd
-
Filesize
933KB
MD547daf0f76da62686a01ad5d45937f50b
SHA1c532c56eba3cd18e7f9c2d06467033873c3772d1
SHA256b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36
SHA512bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd
-
Filesize
629KB
MD506f7b87e2a344b07ea8ba74425f4f077
SHA11746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff
SHA2565b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea
SHA51284cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a
-
Filesize
629KB
MD506f7b87e2a344b07ea8ba74425f4f077
SHA11746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff
SHA2565b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea
SHA51284cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a
-
Filesize
443KB
MD576349ec5228153f1a64bf179aed3872b
SHA1eb1a97515e102a431b3f7c788bead674585c8d06
SHA256e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c
SHA51288f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056
-
Filesize
443KB
MD576349ec5228153f1a64bf179aed3872b
SHA1eb1a97515e102a431b3f7c788bead674585c8d06
SHA256e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c
SHA51288f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
933KB
MD547daf0f76da62686a01ad5d45937f50b
SHA1c532c56eba3cd18e7f9c2d06467033873c3772d1
SHA256b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36
SHA512bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd
-
Filesize
933KB
MD547daf0f76da62686a01ad5d45937f50b
SHA1c532c56eba3cd18e7f9c2d06467033873c3772d1
SHA256b4e71cc5c18f9df4e158da19c7ec8fd131988399586adb5b1a26a0aca0a21c36
SHA512bf931134e6db3bd30793bcba92d01c3e8c16eb22bba1b842951847bcb35c706d15218e3835761d6242d20619c6c484dddc6d78526b9fa77c414869c19b2317bd
-
Filesize
629KB
MD506f7b87e2a344b07ea8ba74425f4f077
SHA11746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff
SHA2565b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea
SHA51284cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a
-
Filesize
629KB
MD506f7b87e2a344b07ea8ba74425f4f077
SHA11746cc165cdfe6a1f5b364c2d7ed5ff5f245b3ff
SHA2565b09f5971e7a59b64d398c770cea5983faef8120107f2c13d966056435d939ea
SHA51284cc2dd5df2b5b16ca6174904dd8c07ee1cd63fb37a618dd36f2f90a1173eed397d5e4fed9ffae19550b756e82d1c4f4f3e589892f11e9f406f36ee920fcf13a
-
Filesize
443KB
MD576349ec5228153f1a64bf179aed3872b
SHA1eb1a97515e102a431b3f7c788bead674585c8d06
SHA256e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c
SHA51288f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056
-
Filesize
443KB
MD576349ec5228153f1a64bf179aed3872b
SHA1eb1a97515e102a431b3f7c788bead674585c8d06
SHA256e2b126c330ecebad60abc81aa12ec4f3522b4f857a086cc7bc228fcd66503d5c
SHA51288f151a3390eed509efede84e86a4684baa1a3ef21537596a985bc4e1fa7eedf09e13679284606a6dd7d4a50029f0ef6ec7a5a7fb117d5bc3d8fe86f66ca7056
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25
-
Filesize
700KB
MD5ad11342d70792eab10dbb7d14afefb95
SHA1958f5cfae062a5015307d100b7c0fab8c88f89ac
SHA256c38b8655ddbfeb902939f58d5e79114f7e5091d56227373c55f0fc2ba438cfda
SHA512bdd27c4630a10d4f8eba1f1856fb90bfdc0c1d2dae3060fb3419e7e4e0d3553e17679382c2b50518e4b481ab9e3b50cfa84cdbe139f82c8a220881fce75bdf25