Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 05:54
Static task
static1
Behavioral task
behavioral1
Sample
8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe
Resource
win10v2004-20230915-en
General
-
Target
8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe
-
Size
1.3MB
-
MD5
aa61ea1f0b44b10e36d34b44be724a71
-
SHA1
f3498c714e2e600a15c4944128a63ad3fde01358
-
SHA256
8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b
-
SHA512
62b48c8c8ebe1673b3cb7f3ccd5e0ec45bd353fecb2cf186dc7bed838c5f4d1717d7e61576320f159a9ade6c3c1688084f9fe7635d50ddc6c484cf3a5f7bc824
-
SSDEEP
24576:9yBDoubteka9EVp9jFT7AP5LT5r7bHJ2lpJdOB4De/qrkN39SHmcs:YeuzIEP9VU5r7zU384s39s
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1964 v8469788.exe 2344 v8503497.exe 2728 v2227526.exe 2928 a2679818.exe -
Loads dropped DLL 13 IoCs
pid Process 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 1964 v8469788.exe 1964 v8469788.exe 2344 v8503497.exe 2344 v8503497.exe 2728 v2227526.exe 2728 v2227526.exe 2728 v2227526.exe 2928 a2679818.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe 1052 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" v8503497.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" v2227526.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" v8469788.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2928 set thread context of 1984 2928 a2679818.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 1052 2928 WerFault.exe 31 2572 1984 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1180 wrote to memory of 1964 1180 8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe 28 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 1964 wrote to memory of 2344 1964 v8469788.exe 29 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2344 wrote to memory of 2728 2344 v8503497.exe 30 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2728 wrote to memory of 2928 2728 v2227526.exe 31 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1984 2928 a2679818.exe 33 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 2928 wrote to memory of 1052 2928 a2679818.exe 34 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35 PID 1984 wrote to memory of 2572 1984 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe"C:\Users\Admin\AppData\Local\Temp\8552100483bd75252d34c2a7b6fb1dc859252c3189a1c4834cabb71ce243ac2b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\v8469788.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\v8503497.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\v2227526.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\a2679818.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2687⤵
- Program crash
PID:2572
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2928 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:1052
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD57af5289e891c43c12b55d957d10653bb
SHA1a8f2a195bc5e210197740b297b1e68510209d6db
SHA256cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702
SHA5125d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d
-
Filesize
1.2MB
MD57af5289e891c43c12b55d957d10653bb
SHA1a8f2a195bc5e210197740b297b1e68510209d6db
SHA256cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702
SHA5125d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d
-
Filesize
921KB
MD5a5f1e27e359b324a7badb0eafb9cba3c
SHA124e984fa30d64cfd49c550595aaf79de59bcc4bb
SHA256f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1
SHA5121b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f
-
Filesize
921KB
MD5a5f1e27e359b324a7badb0eafb9cba3c
SHA124e984fa30d64cfd49c550595aaf79de59bcc4bb
SHA256f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1
SHA5121b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f
-
Filesize
529KB
MD50e53dc14ded65a369207118046d725eb
SHA1c08a22c652870930d37e3b92ad5ed7975b244ef1
SHA256128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba
SHA512f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3
-
Filesize
529KB
MD50e53dc14ded65a369207118046d725eb
SHA1c08a22c652870930d37e3b92ad5ed7975b244ef1
SHA256128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba
SHA512f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.2MB
MD57af5289e891c43c12b55d957d10653bb
SHA1a8f2a195bc5e210197740b297b1e68510209d6db
SHA256cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702
SHA5125d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d
-
Filesize
1.2MB
MD57af5289e891c43c12b55d957d10653bb
SHA1a8f2a195bc5e210197740b297b1e68510209d6db
SHA256cd9ec887ecbe9b48f647063e05c8df56affc93cfd204893c61868892dab35702
SHA5125d8953433de2a984d5281c9f3c0ab99dcd4b0f39ef4192eb58af16cada6639b07ecf507aef51babd1dd93b2a29d52fdb52e86079f258dba4a2fedc66f17bd61d
-
Filesize
921KB
MD5a5f1e27e359b324a7badb0eafb9cba3c
SHA124e984fa30d64cfd49c550595aaf79de59bcc4bb
SHA256f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1
SHA5121b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f
-
Filesize
921KB
MD5a5f1e27e359b324a7badb0eafb9cba3c
SHA124e984fa30d64cfd49c550595aaf79de59bcc4bb
SHA256f9e55b5cec5e135be04521b6043720ad3bd61b5e20141a6464da1dbd84a7dfe1
SHA5121b0338ae3be38161c105e41b07421a99b82ca57545499fd0a64e1541fe14d242b2a2d3900aaee5381db2e099b8f46fe9f74fa9c3895e21f2b365db3e62ef412f
-
Filesize
529KB
MD50e53dc14ded65a369207118046d725eb
SHA1c08a22c652870930d37e3b92ad5ed7975b244ef1
SHA256128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba
SHA512f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3
-
Filesize
529KB
MD50e53dc14ded65a369207118046d725eb
SHA1c08a22c652870930d37e3b92ad5ed7975b244ef1
SHA256128932c1ce37fe549c4092ae6e8a49e1e4ebafbba63f8565e7dcf00caaed8aba
SHA512f131ff186a1929a1b020015299b5eac9dad5d5b38fb6d7c20e2a8dabad51c3435645f77a2626d33c5e78e67c630d3ff6d028d24789c12a4bf603f08e38a56cb3
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf
-
Filesize
1.0MB
MD5e971b075c8f141bb376a8c6b5061e7a6
SHA119ed9194d823669bbea6b19d14a13fafad6e18f1
SHA25677c254945fbec3edac6597c0fa77b2161b4c8aec8ebf6af8c6e1fbb65a4607a1
SHA512343de71858c253bc9f3c9e41eb5f52936194064b9b1dae23fe496276321d8c6fb1562177b983ee47282a239fd01adf03e7c4d6d3bf00229b019ce90a097d52cf