Analysis
-
max time kernel
121s -
max time network
135s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 06:07
Static task
static1
Behavioral task
behavioral1
Sample
d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe
Resource
win10v2004-20230915-en
General
-
Target
d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe
-
Size
1.0MB
-
MD5
7f2e31c427160633de948a131dcf7d54
-
SHA1
a92a03041246b27ad0f7148fcd389a1775580038
-
SHA256
d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27
-
SHA512
6f9c5729e23a174ab9b4b7fad335cf4a7fa4e851dbd7469a8626f0c911897b497c2d0bd2b131efaa5fe3810a15ab76b0b2add52f71ae6ea44b0a4662e76e64d6
-
SSDEEP
24576:FypgyxopsRoqlBAVEeuh0CoZW8fFy1SFtaizDIs:gJxopOoIBEEL7oV8SJ
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2588 x4637400.exe 3000 x2629978.exe 2832 x5517670.exe 2492 g4407006.exe -
Loads dropped DLL 13 IoCs
pid Process 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 2588 x4637400.exe 2588 x4637400.exe 3000 x2629978.exe 3000 x2629978.exe 2832 x5517670.exe 2832 x5517670.exe 2832 x5517670.exe 2492 g4407006.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe 580 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x4637400.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x2629978.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x5517670.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2492 set thread context of 2936 2492 g4407006.exe 35 -
Program crash 2 IoCs
pid pid_target Process procid_target 676 2936 WerFault.exe 35 580 2492 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2184 wrote to memory of 2588 2184 d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe 30 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 2588 wrote to memory of 3000 2588 x4637400.exe 31 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 3000 wrote to memory of 2832 3000 x2629978.exe 32 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2832 wrote to memory of 2492 2832 x5517670.exe 33 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2492 wrote to memory of 2936 2492 g4407006.exe 35 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2936 wrote to memory of 676 2936 AppLaunch.exe 36 PID 2492 wrote to memory of 580 2492 g4407006.exe 37 PID 2492 wrote to memory of 580 2492 g4407006.exe 37 PID 2492 wrote to memory of 580 2492 g4407006.exe 37 PID 2492 wrote to memory of 580 2492 g4407006.exe 37 PID 2492 wrote to memory of 580 2492 g4407006.exe 37 PID 2492 wrote to memory of 580 2492 g4407006.exe 37 PID 2492 wrote to memory of 580 2492 g4407006.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe"C:\Users\Admin\AppData\Local\Temp\d2e9bace5f5a007a3bb3a42b6e8b4ee35e75bfd37d08e2de9246f1de2435cb27.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4637400.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x4637400.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2629978.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x2629978.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5517670.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x5517670.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4407006.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g4407006.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2936 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 2687⤵
- Program crash
PID:676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:580
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD525e74bbba446c49c11a8e6b6deb84242
SHA1712ecd22395ad7a447031e89f4750a103a498a90
SHA256e0879a0bb4b43691f7c5cfe78777da05b27e2c8cb9bc82f09ec7c4ca1ca2707b
SHA512867a19fd727468cf74a68acd00306ba05cf634757461670f5622681801eb7d03aced023a599d5d98d2c70e19b059ac1ec03ecc00581c76723b45a147693d9e7a
-
Filesize
932KB
MD525e74bbba446c49c11a8e6b6deb84242
SHA1712ecd22395ad7a447031e89f4750a103a498a90
SHA256e0879a0bb4b43691f7c5cfe78777da05b27e2c8cb9bc82f09ec7c4ca1ca2707b
SHA512867a19fd727468cf74a68acd00306ba05cf634757461670f5622681801eb7d03aced023a599d5d98d2c70e19b059ac1ec03ecc00581c76723b45a147693d9e7a
-
Filesize
628KB
MD52b8b63dc27491f96e4bd7c359884e3bb
SHA1eca321466aa2b9ee433273963349b3e45a249116
SHA256442fc0c3c95dadecefe25d00677ea9acf00dc46091099b5f66b3ed5e09e9bf92
SHA512efb7148a02c717c59dec005488371babb34f5873d075415fad9259ca86b992ae93a59ded971447fb0b3d95ab28b9093c9c4fd063e7f237b2e372efb25c4deee4
-
Filesize
628KB
MD52b8b63dc27491f96e4bd7c359884e3bb
SHA1eca321466aa2b9ee433273963349b3e45a249116
SHA256442fc0c3c95dadecefe25d00677ea9acf00dc46091099b5f66b3ed5e09e9bf92
SHA512efb7148a02c717c59dec005488371babb34f5873d075415fad9259ca86b992ae93a59ded971447fb0b3d95ab28b9093c9c4fd063e7f237b2e372efb25c4deee4
-
Filesize
442KB
MD547a10bcc96d9e97ab7e9f49f02d9973c
SHA1331530c2698f8ac03a80e60a242c2aeebd76cd8a
SHA256847539e22ce240a5b857f1324dc2b8e265bb42f171ad8385852157f72fb11668
SHA5126876e64f344a536c5782763193905301e9e03623bb33151c6a0b85461c8174d9045da381ef0234d406eff33a995c9c8dc07b8e9a1352a9ccebb55aaaddd719f0
-
Filesize
442KB
MD547a10bcc96d9e97ab7e9f49f02d9973c
SHA1331530c2698f8ac03a80e60a242c2aeebd76cd8a
SHA256847539e22ce240a5b857f1324dc2b8e265bb42f171ad8385852157f72fb11668
SHA5126876e64f344a536c5782763193905301e9e03623bb33151c6a0b85461c8174d9045da381ef0234d406eff33a995c9c8dc07b8e9a1352a9ccebb55aaaddd719f0
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
932KB
MD525e74bbba446c49c11a8e6b6deb84242
SHA1712ecd22395ad7a447031e89f4750a103a498a90
SHA256e0879a0bb4b43691f7c5cfe78777da05b27e2c8cb9bc82f09ec7c4ca1ca2707b
SHA512867a19fd727468cf74a68acd00306ba05cf634757461670f5622681801eb7d03aced023a599d5d98d2c70e19b059ac1ec03ecc00581c76723b45a147693d9e7a
-
Filesize
932KB
MD525e74bbba446c49c11a8e6b6deb84242
SHA1712ecd22395ad7a447031e89f4750a103a498a90
SHA256e0879a0bb4b43691f7c5cfe78777da05b27e2c8cb9bc82f09ec7c4ca1ca2707b
SHA512867a19fd727468cf74a68acd00306ba05cf634757461670f5622681801eb7d03aced023a599d5d98d2c70e19b059ac1ec03ecc00581c76723b45a147693d9e7a
-
Filesize
628KB
MD52b8b63dc27491f96e4bd7c359884e3bb
SHA1eca321466aa2b9ee433273963349b3e45a249116
SHA256442fc0c3c95dadecefe25d00677ea9acf00dc46091099b5f66b3ed5e09e9bf92
SHA512efb7148a02c717c59dec005488371babb34f5873d075415fad9259ca86b992ae93a59ded971447fb0b3d95ab28b9093c9c4fd063e7f237b2e372efb25c4deee4
-
Filesize
628KB
MD52b8b63dc27491f96e4bd7c359884e3bb
SHA1eca321466aa2b9ee433273963349b3e45a249116
SHA256442fc0c3c95dadecefe25d00677ea9acf00dc46091099b5f66b3ed5e09e9bf92
SHA512efb7148a02c717c59dec005488371babb34f5873d075415fad9259ca86b992ae93a59ded971447fb0b3d95ab28b9093c9c4fd063e7f237b2e372efb25c4deee4
-
Filesize
442KB
MD547a10bcc96d9e97ab7e9f49f02d9973c
SHA1331530c2698f8ac03a80e60a242c2aeebd76cd8a
SHA256847539e22ce240a5b857f1324dc2b8e265bb42f171ad8385852157f72fb11668
SHA5126876e64f344a536c5782763193905301e9e03623bb33151c6a0b85461c8174d9045da381ef0234d406eff33a995c9c8dc07b8e9a1352a9ccebb55aaaddd719f0
-
Filesize
442KB
MD547a10bcc96d9e97ab7e9f49f02d9973c
SHA1331530c2698f8ac03a80e60a242c2aeebd76cd8a
SHA256847539e22ce240a5b857f1324dc2b8e265bb42f171ad8385852157f72fb11668
SHA5126876e64f344a536c5782763193905301e9e03623bb33151c6a0b85461c8174d9045da381ef0234d406eff33a995c9c8dc07b8e9a1352a9ccebb55aaaddd719f0
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b
-
Filesize
700KB
MD5a6da4e33edb831e55bce8442178531b7
SHA184e2a1f20321f747bc586078a27ce6b51ec53e61
SHA2562e97b7adc904cbc0e68725b69fd5d600545f44f092f18288b1fc2e31fe228101
SHA512bd6e33a676754d8256c5124de11f337d68cb982009997a828ff0c1117de8425d559f524410ba477737bf0c15a5e5975e74ffa47a81c5ffe5b91ba7bd61bba42b