Analysis
-
max time kernel
122s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 06:34
Static task
static1
Behavioral task
behavioral1
Sample
3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe
Resource
win10v2004-20230915-en
General
-
Target
3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe
-
Size
1.0MB
-
MD5
d14e43543323b4bac9c4cfc4e3bd93b9
-
SHA1
c6172e93dbbcf5270f533cfab8a91228c9ff6454
-
SHA256
3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a
-
SHA512
f9267f02dcd90ce8c83cda1632b7d10f11d30782f054a46b821d5603dcedd877444d7897728e7e4bb9f44d80ac00c5eee5c121fa71e71ea2c56eb43572444074
-
SSDEEP
12288:2Mrby90sLNYUiW/+fsZpO0XgoGHF/Li8VfzHYKCCZSM5Lq0Vs7XqEd3DI59sBjB9:Fy80XO0QLbZSM52067le+Bp762Tue/
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 1652 x7404597.exe 2584 x9090355.exe 2620 x8771871.exe 2712 g3668336.exe -
Loads dropped DLL 13 IoCs
pid Process 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 1652 x7404597.exe 1652 x7404597.exe 2584 x9090355.exe 2584 x9090355.exe 2620 x8771871.exe 2620 x8771871.exe 2620 x8771871.exe 2712 g3668336.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe 2628 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x7404597.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x9090355.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x8771871.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2712 set thread context of 2788 2712 g3668336.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2628 2712 WerFault.exe 32 2536 2788 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1448 wrote to memory of 1652 1448 3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe 28 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 1652 wrote to memory of 2584 1652 x7404597.exe 29 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2584 wrote to memory of 2620 2584 x9090355.exe 30 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2620 wrote to memory of 2712 2620 x8771871.exe 32 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2788 2712 g3668336.exe 33 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2788 wrote to memory of 2536 2788 AppLaunch.exe 35 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34 PID 2712 wrote to memory of 2628 2712 g3668336.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe"C:\Users\Admin\AppData\Local\Temp\3f105c082ad372002b2937f23136a2b748599c170a77bea31ad0f59709c53c4a.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7404597.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x7404597.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9090355.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x9090355.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8771871.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x8771871.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3668336.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g3668336.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 2687⤵
- Program crash
PID:2536
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2712 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2628
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
931KB
MD58b0e6821fc4081bad161fd105a6e0c5f
SHA12679b57e147bd6ca6e22c6954882120d38edfa49
SHA256c785ebc0525dce430f299c60d0de362f5fd3a63cf179089c4559861737d8adc8
SHA5125131e82e4c285cdc9843de5ec818a30c2fbb0c863d457d312921cdbfea0e6505e6c675d0f45bf682cf43fd31056cf8b1967158f7a8618eb18e7444b1122f4246
-
Filesize
931KB
MD58b0e6821fc4081bad161fd105a6e0c5f
SHA12679b57e147bd6ca6e22c6954882120d38edfa49
SHA256c785ebc0525dce430f299c60d0de362f5fd3a63cf179089c4559861737d8adc8
SHA5125131e82e4c285cdc9843de5ec818a30c2fbb0c863d457d312921cdbfea0e6505e6c675d0f45bf682cf43fd31056cf8b1967158f7a8618eb18e7444b1122f4246
-
Filesize
628KB
MD5b4a702ea7d2c28aec14e7582f6ccf980
SHA1a9c7ca2851e0bcbd0e106b9aa48cfc0e66a53deb
SHA25669b1fd95b59aee92fc447268f2b661a60d8b5d76978bd22ce62e2593aba273c7
SHA512c516808044857e32b404711beae6110d8fe9a0b05a9d27e95791ef0db68af0bb62791df6dda4b32a5f4332471c9e692fb43a092e22c3493aee0163cbeecda487
-
Filesize
628KB
MD5b4a702ea7d2c28aec14e7582f6ccf980
SHA1a9c7ca2851e0bcbd0e106b9aa48cfc0e66a53deb
SHA25669b1fd95b59aee92fc447268f2b661a60d8b5d76978bd22ce62e2593aba273c7
SHA512c516808044857e32b404711beae6110d8fe9a0b05a9d27e95791ef0db68af0bb62791df6dda4b32a5f4332471c9e692fb43a092e22c3493aee0163cbeecda487
-
Filesize
443KB
MD5971c06ece4c33212d51ed4b65b6193f9
SHA104d8ab8406488e41e769edbf053a88de6446370a
SHA25649c428832532f8f99d18fab88fffc32cc4a01a7c015e72930dc9d4601b676590
SHA512bf6b7cd5bcb7acf6434725143b8956fa94ae46c335b052e3e025cd1d58079bb885da94f3d4e836d2372d1e6ff63fa7d278b2fb22517c48704701a71b18922f0a
-
Filesize
443KB
MD5971c06ece4c33212d51ed4b65b6193f9
SHA104d8ab8406488e41e769edbf053a88de6446370a
SHA25649c428832532f8f99d18fab88fffc32cc4a01a7c015e72930dc9d4601b676590
SHA512bf6b7cd5bcb7acf6434725143b8956fa94ae46c335b052e3e025cd1d58079bb885da94f3d4e836d2372d1e6ff63fa7d278b2fb22517c48704701a71b18922f0a
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
931KB
MD58b0e6821fc4081bad161fd105a6e0c5f
SHA12679b57e147bd6ca6e22c6954882120d38edfa49
SHA256c785ebc0525dce430f299c60d0de362f5fd3a63cf179089c4559861737d8adc8
SHA5125131e82e4c285cdc9843de5ec818a30c2fbb0c863d457d312921cdbfea0e6505e6c675d0f45bf682cf43fd31056cf8b1967158f7a8618eb18e7444b1122f4246
-
Filesize
931KB
MD58b0e6821fc4081bad161fd105a6e0c5f
SHA12679b57e147bd6ca6e22c6954882120d38edfa49
SHA256c785ebc0525dce430f299c60d0de362f5fd3a63cf179089c4559861737d8adc8
SHA5125131e82e4c285cdc9843de5ec818a30c2fbb0c863d457d312921cdbfea0e6505e6c675d0f45bf682cf43fd31056cf8b1967158f7a8618eb18e7444b1122f4246
-
Filesize
628KB
MD5b4a702ea7d2c28aec14e7582f6ccf980
SHA1a9c7ca2851e0bcbd0e106b9aa48cfc0e66a53deb
SHA25669b1fd95b59aee92fc447268f2b661a60d8b5d76978bd22ce62e2593aba273c7
SHA512c516808044857e32b404711beae6110d8fe9a0b05a9d27e95791ef0db68af0bb62791df6dda4b32a5f4332471c9e692fb43a092e22c3493aee0163cbeecda487
-
Filesize
628KB
MD5b4a702ea7d2c28aec14e7582f6ccf980
SHA1a9c7ca2851e0bcbd0e106b9aa48cfc0e66a53deb
SHA25669b1fd95b59aee92fc447268f2b661a60d8b5d76978bd22ce62e2593aba273c7
SHA512c516808044857e32b404711beae6110d8fe9a0b05a9d27e95791ef0db68af0bb62791df6dda4b32a5f4332471c9e692fb43a092e22c3493aee0163cbeecda487
-
Filesize
443KB
MD5971c06ece4c33212d51ed4b65b6193f9
SHA104d8ab8406488e41e769edbf053a88de6446370a
SHA25649c428832532f8f99d18fab88fffc32cc4a01a7c015e72930dc9d4601b676590
SHA512bf6b7cd5bcb7acf6434725143b8956fa94ae46c335b052e3e025cd1d58079bb885da94f3d4e836d2372d1e6ff63fa7d278b2fb22517c48704701a71b18922f0a
-
Filesize
443KB
MD5971c06ece4c33212d51ed4b65b6193f9
SHA104d8ab8406488e41e769edbf053a88de6446370a
SHA25649c428832532f8f99d18fab88fffc32cc4a01a7c015e72930dc9d4601b676590
SHA512bf6b7cd5bcb7acf6434725143b8956fa94ae46c335b052e3e025cd1d58079bb885da94f3d4e836d2372d1e6ff63fa7d278b2fb22517c48704701a71b18922f0a
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca
-
Filesize
700KB
MD572567f44360557cb50a5e66ecd6eb103
SHA12e62b2a38b8a2074b2b3accf807cf0204625984f
SHA256c68c76ac7309ff10b4bfe6e3a687ee8c54d22a455ab240838427ecee0f1da5c4
SHA512d71af6953bbd0cf5265eca99373a95f86495306b56d86ceab0858048e129b6eed39760615def76240bc2094d799cc8af0299ff0b12c285e7679f8ea2893cb2ca