Analysis
-
max time kernel
122s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 06:24
Static task
static1
Behavioral task
behavioral1
Sample
aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe
Resource
win10v2004-20230915-en
General
-
Target
aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe
-
Size
1.0MB
-
MD5
72a3d3d105073f9c2892e539c133d6a0
-
SHA1
0a68f61862cedbcc975221fbcf83282b2f25a5c3
-
SHA256
aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9
-
SHA512
170ef4c947624019671c96c961b30e717c25637bcff07d997ba11d077d36324e86e1bc382fda4860a44a35e4bc6553159a3ad611dcfebe48c2ad30dd53bcfe69
-
SSDEEP
24576:uySaKgbv0Z5bKN0GTswaIca6YNAUkBmD8g7ct6e0wd3M6j7Wo:9SaKfZzfwaI3eMcsAM
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2100 x3121286.exe 2180 x0035317.exe 2576 x4205135.exe 2724 g0412458.exe -
Loads dropped DLL 13 IoCs
pid Process 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 2100 x3121286.exe 2100 x3121286.exe 2180 x0035317.exe 2180 x0035317.exe 2576 x4205135.exe 2576 x4205135.exe 2576 x4205135.exe 2724 g0412458.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe 2688 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x0035317.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x4205135.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x3121286.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2724 set thread context of 2492 2724 g0412458.exe 34 -
Program crash 2 IoCs
pid pid_target Process procid_target 2688 2724 WerFault.exe 31 2804 2492 WerFault.exe 34 -
Suspicious use of WriteProcessMemory 63 IoCs
description pid Process procid_target PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2956 wrote to memory of 2100 2956 aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe 28 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2100 wrote to memory of 2180 2100 x3121286.exe 29 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2180 wrote to memory of 2576 2180 x0035317.exe 30 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2576 wrote to memory of 2724 2576 x4205135.exe 31 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 1696 2724 g0412458.exe 33 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2492 2724 g0412458.exe 34 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2724 wrote to memory of 2688 2724 g0412458.exe 35 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36 PID 2492 wrote to memory of 2804 2492 AppLaunch.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe"C:\Users\Admin\AppData\Local\Temp\aa67de03e4c0dddd3e070c87e1b1f440f99b9b1941471b7b41f3d46b593101b9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3121286.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x3121286.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0035317.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x0035317.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4205135.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x4205135.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0412458.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g0412458.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵PID:1696
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2687⤵
- Program crash
PID:2804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2724 -s 2806⤵
- Loads dropped DLL
- Program crash
PID:2688
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD51156c2c611dca04f6b5aba49640ebc1e
SHA148074d63bee10f0a8f186df311a351b0de754426
SHA25611f6272fda724de55c078c4a3823b502c41c54167ec66931f8a33c61c627d382
SHA512829da6243a745d26cb04b81633623a2ecd1b9229fde95f40a9e7309b61b7c8518f45abd7fb79263af8c121a053d2ef304ad2a9bf4e4e2268a538e13917b0eece
-
Filesize
932KB
MD51156c2c611dca04f6b5aba49640ebc1e
SHA148074d63bee10f0a8f186df311a351b0de754426
SHA25611f6272fda724de55c078c4a3823b502c41c54167ec66931f8a33c61c627d382
SHA512829da6243a745d26cb04b81633623a2ecd1b9229fde95f40a9e7309b61b7c8518f45abd7fb79263af8c121a053d2ef304ad2a9bf4e4e2268a538e13917b0eece
-
Filesize
629KB
MD555bef2b05a85e6dd7289766f99c04ff5
SHA1005edf7a7db1f8d394bd896d4e093c7e09650263
SHA256fa44132c7531cbb7509a676ba8f4f63e3d69da306d5b57eecf0834c5d9f44405
SHA512a164b2f842f9fd87a3ffb609ea6a5b33457d1391e3123339f48ab6a2b76bfeb6af1fa9f46d9161e931af522a07e48cd47931b958da0c260f87a2c7b40ca3520f
-
Filesize
629KB
MD555bef2b05a85e6dd7289766f99c04ff5
SHA1005edf7a7db1f8d394bd896d4e093c7e09650263
SHA256fa44132c7531cbb7509a676ba8f4f63e3d69da306d5b57eecf0834c5d9f44405
SHA512a164b2f842f9fd87a3ffb609ea6a5b33457d1391e3123339f48ab6a2b76bfeb6af1fa9f46d9161e931af522a07e48cd47931b958da0c260f87a2c7b40ca3520f
-
Filesize
443KB
MD59c0ab95052685362c0d1c33b39c4c5fe
SHA17758af6fc7e5e47e61bc16b826688a4a8a39d6fc
SHA256a931bbeb9a42c35de921e51022e3ccbd12186798fdf28a66f91c5be572e0bac5
SHA5127c7265f3092148e92a16af19bcd91dfa34a40622bd26f040834d8ca0aa81db4d0e1917079863f6444b00c23fa568b05d411b16b815d1a06ed27ad335f73524d1
-
Filesize
443KB
MD59c0ab95052685362c0d1c33b39c4c5fe
SHA17758af6fc7e5e47e61bc16b826688a4a8a39d6fc
SHA256a931bbeb9a42c35de921e51022e3ccbd12186798fdf28a66f91c5be572e0bac5
SHA5127c7265f3092148e92a16af19bcd91dfa34a40622bd26f040834d8ca0aa81db4d0e1917079863f6444b00c23fa568b05d411b16b815d1a06ed27ad335f73524d1
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
932KB
MD51156c2c611dca04f6b5aba49640ebc1e
SHA148074d63bee10f0a8f186df311a351b0de754426
SHA25611f6272fda724de55c078c4a3823b502c41c54167ec66931f8a33c61c627d382
SHA512829da6243a745d26cb04b81633623a2ecd1b9229fde95f40a9e7309b61b7c8518f45abd7fb79263af8c121a053d2ef304ad2a9bf4e4e2268a538e13917b0eece
-
Filesize
932KB
MD51156c2c611dca04f6b5aba49640ebc1e
SHA148074d63bee10f0a8f186df311a351b0de754426
SHA25611f6272fda724de55c078c4a3823b502c41c54167ec66931f8a33c61c627d382
SHA512829da6243a745d26cb04b81633623a2ecd1b9229fde95f40a9e7309b61b7c8518f45abd7fb79263af8c121a053d2ef304ad2a9bf4e4e2268a538e13917b0eece
-
Filesize
629KB
MD555bef2b05a85e6dd7289766f99c04ff5
SHA1005edf7a7db1f8d394bd896d4e093c7e09650263
SHA256fa44132c7531cbb7509a676ba8f4f63e3d69da306d5b57eecf0834c5d9f44405
SHA512a164b2f842f9fd87a3ffb609ea6a5b33457d1391e3123339f48ab6a2b76bfeb6af1fa9f46d9161e931af522a07e48cd47931b958da0c260f87a2c7b40ca3520f
-
Filesize
629KB
MD555bef2b05a85e6dd7289766f99c04ff5
SHA1005edf7a7db1f8d394bd896d4e093c7e09650263
SHA256fa44132c7531cbb7509a676ba8f4f63e3d69da306d5b57eecf0834c5d9f44405
SHA512a164b2f842f9fd87a3ffb609ea6a5b33457d1391e3123339f48ab6a2b76bfeb6af1fa9f46d9161e931af522a07e48cd47931b958da0c260f87a2c7b40ca3520f
-
Filesize
443KB
MD59c0ab95052685362c0d1c33b39c4c5fe
SHA17758af6fc7e5e47e61bc16b826688a4a8a39d6fc
SHA256a931bbeb9a42c35de921e51022e3ccbd12186798fdf28a66f91c5be572e0bac5
SHA5127c7265f3092148e92a16af19bcd91dfa34a40622bd26f040834d8ca0aa81db4d0e1917079863f6444b00c23fa568b05d411b16b815d1a06ed27ad335f73524d1
-
Filesize
443KB
MD59c0ab95052685362c0d1c33b39c4c5fe
SHA17758af6fc7e5e47e61bc16b826688a4a8a39d6fc
SHA256a931bbeb9a42c35de921e51022e3ccbd12186798fdf28a66f91c5be572e0bac5
SHA5127c7265f3092148e92a16af19bcd91dfa34a40622bd26f040834d8ca0aa81db4d0e1917079863f6444b00c23fa568b05d411b16b815d1a06ed27ad335f73524d1
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439
-
Filesize
700KB
MD5c10ffa12b3fadb06fd87415aac67e6ab
SHA1276c6aca498bcb114bf476a49eee70862916e640
SHA256132e735890b81aec054aa0d7db651c79df0b72867d246cd6b35f9f1afda808e1
SHA51282a36adb0f39857444c6f5f356532054fd5e0408a8132496c1cc7e16a061e38f11f056e74c3a293507a7f08418fcd673d0c2abf37babc470e183056b5ae33439