Analysis
-
max time kernel
119s -
max time network
129s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 05:02
Static task
static1
Behavioral task
behavioral1
Sample
0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe
Resource
win10v2004-20230915-en
General
-
Target
0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe
-
Size
1.0MB
-
MD5
e1676989588741ad6c80e13ebc267491
-
SHA1
2c8354591bc4e0ed6d8a20fbf48fdf9dd1d2a533
-
SHA256
0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd
-
SHA512
04bd7aa3b51194ebc31aa614098deecf53ce3295236eb394ebf35e7df0211a9b960ff3f92bb3049e0736701ba8f5b9a4cc4f7858cc7c3ccbd54ea800fc3f39a1
-
SSDEEP
24576:YyRr2wHLOjPggZvf9rWGPXRwu/pNgvflzmHP3wwfkKmg:fRPgPnRlNQs3
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3008 x3945728.exe 2664 x4199127.exe 2548 x5952378.exe 2232 g9269993.exe -
Loads dropped DLL 13 IoCs
pid Process 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 3008 x3945728.exe 3008 x3945728.exe 2664 x4199127.exe 2664 x4199127.exe 2548 x5952378.exe 2548 x5952378.exe 2548 x5952378.exe 2232 g9269993.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3945728.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4199127.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5952378.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2232 set thread context of 2492 2232 g9269993.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 2880 2232 WerFault.exe 31 324 2492 WerFault.exe 35 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3040 wrote to memory of 3008 3040 0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe 28 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 3008 wrote to memory of 2664 3008 x3945728.exe 29 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2664 wrote to memory of 2548 2664 x4199127.exe 30 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2548 wrote to memory of 2232 2548 x5952378.exe 31 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2232 wrote to memory of 2492 2232 g9269993.exe 35 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2492 wrote to memory of 324 2492 AppLaunch.exe 37 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36 PID 2232 wrote to memory of 2880 2232 g9269993.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe"C:\Users\Admin\AppData\Local\Temp\0b97fab15da596b5e178ed4c683b32137551e7cd28d68ca3db085f0b5ec9eafd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3945728.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3945728.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4199127.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4199127.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5952378.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5952378.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9269993.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g9269993.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2687⤵
- Program crash
PID:324
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2880
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD5c88bbcdcb9fa8c47f58a12f1a765ced0
SHA1852d3f8ebe33d4e33f65da963dd4f2c0a520b739
SHA25630f4caf4a9c3203c22334178d46e0da3b1d17e26d6c3241c232bc283f629f70a
SHA51255b62144763803040ecf6e07867939e38c048e52c8a4c3467ad7eb9b301f8a1dc01f70c5bca03b9279e6da3a521bee8bb5b5801213645057476cc3159b85af44
-
Filesize
932KB
MD5c88bbcdcb9fa8c47f58a12f1a765ced0
SHA1852d3f8ebe33d4e33f65da963dd4f2c0a520b739
SHA25630f4caf4a9c3203c22334178d46e0da3b1d17e26d6c3241c232bc283f629f70a
SHA51255b62144763803040ecf6e07867939e38c048e52c8a4c3467ad7eb9b301f8a1dc01f70c5bca03b9279e6da3a521bee8bb5b5801213645057476cc3159b85af44
-
Filesize
628KB
MD52e5a243271255810b466e15ff15010d7
SHA1a79865e26a5e762fa956e00b62feb2313e5d7dbe
SHA2561c90b22b26b5060569b6fbab8aef02ad6367032b99ced87f399639830321f47c
SHA512194607194086b459743ec95d2a40160c8884df2184d45f63e1625fa22031d9ead653d31f730b41354f3479b4564f3dff33c2ddc809c8284b31ee638f6040e60a
-
Filesize
628KB
MD52e5a243271255810b466e15ff15010d7
SHA1a79865e26a5e762fa956e00b62feb2313e5d7dbe
SHA2561c90b22b26b5060569b6fbab8aef02ad6367032b99ced87f399639830321f47c
SHA512194607194086b459743ec95d2a40160c8884df2184d45f63e1625fa22031d9ead653d31f730b41354f3479b4564f3dff33c2ddc809c8284b31ee638f6040e60a
-
Filesize
442KB
MD5d98d7aaab673f871f46ce0d1f286539f
SHA11915cf5adcc0ac49aa5938afcfdbac8100a31a70
SHA25613f0f7a777c6cec3f13c088826d3d4e4672c89357649e45587aeebcc51b9a9a4
SHA5126b1bc95d0649dcbe1850b63ff34fcfd3ad49afb57fe419b7f43fe27a4e797ffa643f894daced91a40ec7676c7a4a0b44c53a3f0134e3e75c28c31f6899470449
-
Filesize
442KB
MD5d98d7aaab673f871f46ce0d1f286539f
SHA11915cf5adcc0ac49aa5938afcfdbac8100a31a70
SHA25613f0f7a777c6cec3f13c088826d3d4e4672c89357649e45587aeebcc51b9a9a4
SHA5126b1bc95d0649dcbe1850b63ff34fcfd3ad49afb57fe419b7f43fe27a4e797ffa643f894daced91a40ec7676c7a4a0b44c53a3f0134e3e75c28c31f6899470449
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
932KB
MD5c88bbcdcb9fa8c47f58a12f1a765ced0
SHA1852d3f8ebe33d4e33f65da963dd4f2c0a520b739
SHA25630f4caf4a9c3203c22334178d46e0da3b1d17e26d6c3241c232bc283f629f70a
SHA51255b62144763803040ecf6e07867939e38c048e52c8a4c3467ad7eb9b301f8a1dc01f70c5bca03b9279e6da3a521bee8bb5b5801213645057476cc3159b85af44
-
Filesize
932KB
MD5c88bbcdcb9fa8c47f58a12f1a765ced0
SHA1852d3f8ebe33d4e33f65da963dd4f2c0a520b739
SHA25630f4caf4a9c3203c22334178d46e0da3b1d17e26d6c3241c232bc283f629f70a
SHA51255b62144763803040ecf6e07867939e38c048e52c8a4c3467ad7eb9b301f8a1dc01f70c5bca03b9279e6da3a521bee8bb5b5801213645057476cc3159b85af44
-
Filesize
628KB
MD52e5a243271255810b466e15ff15010d7
SHA1a79865e26a5e762fa956e00b62feb2313e5d7dbe
SHA2561c90b22b26b5060569b6fbab8aef02ad6367032b99ced87f399639830321f47c
SHA512194607194086b459743ec95d2a40160c8884df2184d45f63e1625fa22031d9ead653d31f730b41354f3479b4564f3dff33c2ddc809c8284b31ee638f6040e60a
-
Filesize
628KB
MD52e5a243271255810b466e15ff15010d7
SHA1a79865e26a5e762fa956e00b62feb2313e5d7dbe
SHA2561c90b22b26b5060569b6fbab8aef02ad6367032b99ced87f399639830321f47c
SHA512194607194086b459743ec95d2a40160c8884df2184d45f63e1625fa22031d9ead653d31f730b41354f3479b4564f3dff33c2ddc809c8284b31ee638f6040e60a
-
Filesize
442KB
MD5d98d7aaab673f871f46ce0d1f286539f
SHA11915cf5adcc0ac49aa5938afcfdbac8100a31a70
SHA25613f0f7a777c6cec3f13c088826d3d4e4672c89357649e45587aeebcc51b9a9a4
SHA5126b1bc95d0649dcbe1850b63ff34fcfd3ad49afb57fe419b7f43fe27a4e797ffa643f894daced91a40ec7676c7a4a0b44c53a3f0134e3e75c28c31f6899470449
-
Filesize
442KB
MD5d98d7aaab673f871f46ce0d1f286539f
SHA11915cf5adcc0ac49aa5938afcfdbac8100a31a70
SHA25613f0f7a777c6cec3f13c088826d3d4e4672c89357649e45587aeebcc51b9a9a4
SHA5126b1bc95d0649dcbe1850b63ff34fcfd3ad49afb57fe419b7f43fe27a4e797ffa643f894daced91a40ec7676c7a4a0b44c53a3f0134e3e75c28c31f6899470449
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9
-
Filesize
700KB
MD54a6f9962fbdbaa879588d5d1b3cd07f6
SHA11a02c36f25313dd12474c8ac42441ed8e35c7b2f
SHA2569f37898d814eb72500921e97e18a99b8713b87dd6fc7cb4b36d0872536dd3520
SHA51265ea938cd49b2db363b8c4ffc671fb8af25b085762642a7a5e26493ce86c5736e13388e28267e51b018f476c57db1246b2f28075f8d0c6c3302b3633eedbeec9