Analysis
-
max time kernel
120s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12-10-2023 06:57
Static task
static1
Behavioral task
behavioral1
Sample
313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe
Resource
win10v2004-20230915-en
General
-
Target
313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe
-
Size
1.0MB
-
MD5
3c68d8b81ea0b476f599e12e8a0a1537
-
SHA1
493d7fe200184c68a696803849345a52cbbdbe19
-
SHA256
313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9
-
SHA512
109ff8e011538cd3d789b24decbc0d3257c28749b2440b9c5721fc1dfb1e55fe661cac0783c5bc3f0ffb76c8494ca8c5d551d31f558f42917a73c09ca9396652
-
SSDEEP
12288:lMrvy90gHIxlkY1pybLNj/fsZsHc6VIkIvUA54I6zvRVrwhjszleFaelXi28dH5b:eyi/X1AV9it3mVzJVSQelSF2ZGyfqR
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2100 x8068523.exe 2736 x4086327.exe 2612 x1377140.exe 2348 g6013171.exe -
Loads dropped DLL 13 IoCs
pid Process 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 2100 x8068523.exe 2100 x8068523.exe 2736 x4086327.exe 2736 x4086327.exe 2612 x1377140.exe 2612 x1377140.exe 2612 x1377140.exe 2348 g6013171.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe 2944 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" x4086327.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" x1377140.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" x8068523.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2348 set thread context of 2652 2348 g6013171.exe 33 -
Program crash 2 IoCs
pid pid_target Process procid_target 2608 2652 WerFault.exe 33 2944 2348 WerFault.exe 31 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2412 wrote to memory of 2100 2412 313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe 28 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2100 wrote to memory of 2736 2100 x8068523.exe 29 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2736 wrote to memory of 2612 2736 x4086327.exe 30 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2612 wrote to memory of 2348 2612 x1377140.exe 31 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2652 2348 g6013171.exe 33 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35 PID 2348 wrote to memory of 2944 2348 g6013171.exe 36 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35 PID 2652 wrote to memory of 2608 2652 AppLaunch.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe"C:\Users\Admin\AppData\Local\Temp\313fb3b3daf57241cd8f8a84921bda55a40dd68b6360f2a582f6f02babb2e3c9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8068523.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\x8068523.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4086327.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\x4086327.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1377140.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\x1377140.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6013171.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\g6013171.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"6⤵
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2652 -s 2687⤵
- Program crash
PID:2608
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 2686⤵
- Loads dropped DLL
- Program crash
PID:2944
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
932KB
MD5e16b22d50a0e9f91e59d6f753a697b14
SHA144804d819ceb54e812298acc1441b76714fc739d
SHA25624c8e82a20b741c87cae0563790ee45c36c6ce33eff60126dc7a0e90daacd28e
SHA512e8c8de51d7d0105a0ee8829a5598a1ba440aac7ff81ada927c7a35a499e6e8b549b559bec7ed721e4cc726ed39bd040101c47e879020ecfc5cc442cf9e32c844
-
Filesize
932KB
MD5e16b22d50a0e9f91e59d6f753a697b14
SHA144804d819ceb54e812298acc1441b76714fc739d
SHA25624c8e82a20b741c87cae0563790ee45c36c6ce33eff60126dc7a0e90daacd28e
SHA512e8c8de51d7d0105a0ee8829a5598a1ba440aac7ff81ada927c7a35a499e6e8b549b559bec7ed721e4cc726ed39bd040101c47e879020ecfc5cc442cf9e32c844
-
Filesize
628KB
MD58274c759d7bdceb820439e8d6805a2c9
SHA1c7a18a6d046319e665770ff8829ddc9e196de450
SHA256239a906ad929605bde5c888cf7f563b8fe6e198408b4e0506fbdb3ccbbba2419
SHA5122672d1fc6baa68260757c125044d9407243e95ff10e593c6c61cab30585f8e487b2f7c7f03cae14eeba229dca5678dd2c92ba7225569b68073d1f4e9b46e98b3
-
Filesize
628KB
MD58274c759d7bdceb820439e8d6805a2c9
SHA1c7a18a6d046319e665770ff8829ddc9e196de450
SHA256239a906ad929605bde5c888cf7f563b8fe6e198408b4e0506fbdb3ccbbba2419
SHA5122672d1fc6baa68260757c125044d9407243e95ff10e593c6c61cab30585f8e487b2f7c7f03cae14eeba229dca5678dd2c92ba7225569b68073d1f4e9b46e98b3
-
Filesize
443KB
MD552b880f470a2d9f6fe9a4b43d21fd76f
SHA13ca77a973ab1b2407660da408353c5bfc0ffc8a3
SHA256d45454620fb09240c8a5de19d186b1df8cabc07b5ce73d720fbf5d4abf663135
SHA512a72971f6772c7de96ee3f79b945f9f06bb7ba587b6840850074863a1ac974d69b27de6bdb9534a0c3456216545fd241496b4b4a84d6a1c40aef09845210014f3
-
Filesize
443KB
MD552b880f470a2d9f6fe9a4b43d21fd76f
SHA13ca77a973ab1b2407660da408353c5bfc0ffc8a3
SHA256d45454620fb09240c8a5de19d186b1df8cabc07b5ce73d720fbf5d4abf663135
SHA512a72971f6772c7de96ee3f79b945f9f06bb7ba587b6840850074863a1ac974d69b27de6bdb9534a0c3456216545fd241496b4b4a84d6a1c40aef09845210014f3
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
932KB
MD5e16b22d50a0e9f91e59d6f753a697b14
SHA144804d819ceb54e812298acc1441b76714fc739d
SHA25624c8e82a20b741c87cae0563790ee45c36c6ce33eff60126dc7a0e90daacd28e
SHA512e8c8de51d7d0105a0ee8829a5598a1ba440aac7ff81ada927c7a35a499e6e8b549b559bec7ed721e4cc726ed39bd040101c47e879020ecfc5cc442cf9e32c844
-
Filesize
932KB
MD5e16b22d50a0e9f91e59d6f753a697b14
SHA144804d819ceb54e812298acc1441b76714fc739d
SHA25624c8e82a20b741c87cae0563790ee45c36c6ce33eff60126dc7a0e90daacd28e
SHA512e8c8de51d7d0105a0ee8829a5598a1ba440aac7ff81ada927c7a35a499e6e8b549b559bec7ed721e4cc726ed39bd040101c47e879020ecfc5cc442cf9e32c844
-
Filesize
628KB
MD58274c759d7bdceb820439e8d6805a2c9
SHA1c7a18a6d046319e665770ff8829ddc9e196de450
SHA256239a906ad929605bde5c888cf7f563b8fe6e198408b4e0506fbdb3ccbbba2419
SHA5122672d1fc6baa68260757c125044d9407243e95ff10e593c6c61cab30585f8e487b2f7c7f03cae14eeba229dca5678dd2c92ba7225569b68073d1f4e9b46e98b3
-
Filesize
628KB
MD58274c759d7bdceb820439e8d6805a2c9
SHA1c7a18a6d046319e665770ff8829ddc9e196de450
SHA256239a906ad929605bde5c888cf7f563b8fe6e198408b4e0506fbdb3ccbbba2419
SHA5122672d1fc6baa68260757c125044d9407243e95ff10e593c6c61cab30585f8e487b2f7c7f03cae14eeba229dca5678dd2c92ba7225569b68073d1f4e9b46e98b3
-
Filesize
443KB
MD552b880f470a2d9f6fe9a4b43d21fd76f
SHA13ca77a973ab1b2407660da408353c5bfc0ffc8a3
SHA256d45454620fb09240c8a5de19d186b1df8cabc07b5ce73d720fbf5d4abf663135
SHA512a72971f6772c7de96ee3f79b945f9f06bb7ba587b6840850074863a1ac974d69b27de6bdb9534a0c3456216545fd241496b4b4a84d6a1c40aef09845210014f3
-
Filesize
443KB
MD552b880f470a2d9f6fe9a4b43d21fd76f
SHA13ca77a973ab1b2407660da408353c5bfc0ffc8a3
SHA256d45454620fb09240c8a5de19d186b1df8cabc07b5ce73d720fbf5d4abf663135
SHA512a72971f6772c7de96ee3f79b945f9f06bb7ba587b6840850074863a1ac974d69b27de6bdb9534a0c3456216545fd241496b4b4a84d6a1c40aef09845210014f3
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa
-
Filesize
700KB
MD5605f34b333baaaa4c3aab15eee268720
SHA1b9c4d40d5c4b3b9608b2c7d9f7348f69d7b22528
SHA256f7153ccc43248dcf90b58bfe290f216d1266e16d9a303c8729b0750b9587e394
SHA5128abac8398725ad4ad0ddc88c7dd286d97a0e13e2115a645b752c86712b8d7eab86b7a1fed3ac6146250c2518ebf45a24b9132a20a5362a8d130301062e42ccfa