Analysis
-
max time kernel
106s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
12/10/2023, 09:52
Static task
static1
Behavioral task
behavioral1
Sample
58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe
Resource
win10v2004-20230915-en
General
-
Target
58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe
-
Size
1.4MB
-
MD5
846dbd05d80aeff4b961ba6160ec03c3
-
SHA1
06b2649aff3fc7e83159968aa48c57c3c25223ef
-
SHA256
58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b
-
SHA512
feafd273a46e86aa74ab2d14344daab88fc1df814ad0ad19e7758173484153683a2bb618f1709609e7d50658ab354b78bcd3e8fbd509a1c470b554f72f3cab81
-
SSDEEP
24576:vypyJGxZuOZOj2GBudEvZU6ijZ6aIx3ikJslkMCpvVCm0milr3zKV+g:6pyJGxkNaGBfvNNJikOFmil
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
pid Process 2720 z6951558.exe 2608 z1072776.exe 2480 z1018984.exe 2952 z1843276.exe 1896 q7949244.exe -
Loads dropped DLL 15 IoCs
pid Process 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 2720 z6951558.exe 2720 z6951558.exe 2608 z1072776.exe 2608 z1072776.exe 2480 z1018984.exe 2480 z1018984.exe 2952 z1843276.exe 2952 z1843276.exe 2952 z1843276.exe 1896 q7949244.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe 1624 WerFault.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" z6951558.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" z1072776.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" z1018984.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup4 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP004.TMP\\\"" z1843276.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1896 set thread context of 2940 1896 q7949244.exe 35 -
Program crash 1 IoCs
pid pid_target Process procid_target 1624 1896 WerFault.exe 33 -
Suspicious use of WriteProcessMemory 56 IoCs
description pid Process procid_target PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2672 wrote to memory of 2720 2672 58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe 29 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2720 wrote to memory of 2608 2720 z6951558.exe 30 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2608 wrote to memory of 2480 2608 z1072776.exe 31 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2480 wrote to memory of 2952 2480 z1018984.exe 32 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 2952 wrote to memory of 1896 2952 z1843276.exe 33 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 2940 1896 q7949244.exe 35 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36 PID 1896 wrote to memory of 1624 1896 q7949244.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe"C:\Users\Admin\AppData\Local\Temp\58edf9210d52bb946c0b078685f7deea7f117eec377fb45ce1d3e9baf8b8294b.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6951558.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\z6951558.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1072776.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\z1072776.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1018984.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\z1018984.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1843276.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\z1843276.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7949244.exeC:\Users\Admin\AppData\Local\Temp\IXP004.TMP\q7949244.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1896 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"7⤵PID:2940
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 2687⤵
- Loads dropped DLL
- Program crash
PID:1624
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD53b0595fa75cab9108017e54e575066f8
SHA196a274a5e6a8023754d7681376d9fc6165cc1244
SHA2560eb3f4a59baa957db87b64a0e8aa72df4db642eaae59b39464ef95178bf04886
SHA5122ee5aa3c38ac4b269234afc53b823445d1efcbc1923ddaab1727a25e5e5c926ae180adbbc70fc7a54f6132c075a07111d8b9473fda5f5dd7ed4767968919e23c
-
Filesize
1.3MB
MD53b0595fa75cab9108017e54e575066f8
SHA196a274a5e6a8023754d7681376d9fc6165cc1244
SHA2560eb3f4a59baa957db87b64a0e8aa72df4db642eaae59b39464ef95178bf04886
SHA5122ee5aa3c38ac4b269234afc53b823445d1efcbc1923ddaab1727a25e5e5c926ae180adbbc70fc7a54f6132c075a07111d8b9473fda5f5dd7ed4767968919e23c
-
Filesize
941KB
MD5c236dd8ab9b30a3cc21a319e1b654e3e
SHA16dbda47bafca6a74ee47f8b7492779223fa9124f
SHA25613ca20f10007ec4726466a77888d15fbf529058177df442659238c6fb3eea201
SHA512af1a894bcbe44138e78ff50f8ea2e590bba1b094e5d06f051386939044a23eaad0cebc32b37bac1d9a5dc5b89cf4a310f53a5b8a39f087ecf509dc436e841d46
-
Filesize
941KB
MD5c236dd8ab9b30a3cc21a319e1b654e3e
SHA16dbda47bafca6a74ee47f8b7492779223fa9124f
SHA25613ca20f10007ec4726466a77888d15fbf529058177df442659238c6fb3eea201
SHA512af1a894bcbe44138e78ff50f8ea2e590bba1b094e5d06f051386939044a23eaad0cebc32b37bac1d9a5dc5b89cf4a310f53a5b8a39f087ecf509dc436e841d46
-
Filesize
758KB
MD5bd6e506fcd2d5f60594a3331c451f301
SHA1b118f5537b58d8e11fd36f1efb4cbd10f5a5602d
SHA25696afbd7e5a2867f1bfd5ba5142885cd502144bba3abcd6bf491efbcaeaf028fc
SHA5122f117f5589f5618d1400304d7a46f7f2d79e70b8bce5b6b862389702b2eddc95e8d869c899ea34e03f0cd9eb48a2800467a261c0af5ca4b304374a0084643a17
-
Filesize
758KB
MD5bd6e506fcd2d5f60594a3331c451f301
SHA1b118f5537b58d8e11fd36f1efb4cbd10f5a5602d
SHA25696afbd7e5a2867f1bfd5ba5142885cd502144bba3abcd6bf491efbcaeaf028fc
SHA5122f117f5589f5618d1400304d7a46f7f2d79e70b8bce5b6b862389702b2eddc95e8d869c899ea34e03f0cd9eb48a2800467a261c0af5ca4b304374a0084643a17
-
Filesize
575KB
MD504262ebcea2ababbb9a9dfcb66b86b68
SHA1b85057b998b77000f9221e7ad4d65c2e767d5efe
SHA256b036b10fba1441a1bb32b2b139da4a57fbd60724ef90b720807b9725ea261672
SHA512b2119e91b04876a66e156187f34b9ad320761dc65490b499c7131953855fafe8176840416132e6a99074f8aec3b4bc8865a89888b98ec2453fc474b9d07357a0
-
Filesize
575KB
MD504262ebcea2ababbb9a9dfcb66b86b68
SHA1b85057b998b77000f9221e7ad4d65c2e767d5efe
SHA256b036b10fba1441a1bb32b2b139da4a57fbd60724ef90b720807b9725ea261672
SHA512b2119e91b04876a66e156187f34b9ad320761dc65490b499c7131953855fafe8176840416132e6a99074f8aec3b4bc8865a89888b98ec2453fc474b9d07357a0
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.3MB
MD53b0595fa75cab9108017e54e575066f8
SHA196a274a5e6a8023754d7681376d9fc6165cc1244
SHA2560eb3f4a59baa957db87b64a0e8aa72df4db642eaae59b39464ef95178bf04886
SHA5122ee5aa3c38ac4b269234afc53b823445d1efcbc1923ddaab1727a25e5e5c926ae180adbbc70fc7a54f6132c075a07111d8b9473fda5f5dd7ed4767968919e23c
-
Filesize
1.3MB
MD53b0595fa75cab9108017e54e575066f8
SHA196a274a5e6a8023754d7681376d9fc6165cc1244
SHA2560eb3f4a59baa957db87b64a0e8aa72df4db642eaae59b39464ef95178bf04886
SHA5122ee5aa3c38ac4b269234afc53b823445d1efcbc1923ddaab1727a25e5e5c926ae180adbbc70fc7a54f6132c075a07111d8b9473fda5f5dd7ed4767968919e23c
-
Filesize
941KB
MD5c236dd8ab9b30a3cc21a319e1b654e3e
SHA16dbda47bafca6a74ee47f8b7492779223fa9124f
SHA25613ca20f10007ec4726466a77888d15fbf529058177df442659238c6fb3eea201
SHA512af1a894bcbe44138e78ff50f8ea2e590bba1b094e5d06f051386939044a23eaad0cebc32b37bac1d9a5dc5b89cf4a310f53a5b8a39f087ecf509dc436e841d46
-
Filesize
941KB
MD5c236dd8ab9b30a3cc21a319e1b654e3e
SHA16dbda47bafca6a74ee47f8b7492779223fa9124f
SHA25613ca20f10007ec4726466a77888d15fbf529058177df442659238c6fb3eea201
SHA512af1a894bcbe44138e78ff50f8ea2e590bba1b094e5d06f051386939044a23eaad0cebc32b37bac1d9a5dc5b89cf4a310f53a5b8a39f087ecf509dc436e841d46
-
Filesize
758KB
MD5bd6e506fcd2d5f60594a3331c451f301
SHA1b118f5537b58d8e11fd36f1efb4cbd10f5a5602d
SHA25696afbd7e5a2867f1bfd5ba5142885cd502144bba3abcd6bf491efbcaeaf028fc
SHA5122f117f5589f5618d1400304d7a46f7f2d79e70b8bce5b6b862389702b2eddc95e8d869c899ea34e03f0cd9eb48a2800467a261c0af5ca4b304374a0084643a17
-
Filesize
758KB
MD5bd6e506fcd2d5f60594a3331c451f301
SHA1b118f5537b58d8e11fd36f1efb4cbd10f5a5602d
SHA25696afbd7e5a2867f1bfd5ba5142885cd502144bba3abcd6bf491efbcaeaf028fc
SHA5122f117f5589f5618d1400304d7a46f7f2d79e70b8bce5b6b862389702b2eddc95e8d869c899ea34e03f0cd9eb48a2800467a261c0af5ca4b304374a0084643a17
-
Filesize
575KB
MD504262ebcea2ababbb9a9dfcb66b86b68
SHA1b85057b998b77000f9221e7ad4d65c2e767d5efe
SHA256b036b10fba1441a1bb32b2b139da4a57fbd60724ef90b720807b9725ea261672
SHA512b2119e91b04876a66e156187f34b9ad320761dc65490b499c7131953855fafe8176840416132e6a99074f8aec3b4bc8865a89888b98ec2453fc474b9d07357a0
-
Filesize
575KB
MD504262ebcea2ababbb9a9dfcb66b86b68
SHA1b85057b998b77000f9221e7ad4d65c2e767d5efe
SHA256b036b10fba1441a1bb32b2b139da4a57fbd60724ef90b720807b9725ea261672
SHA512b2119e91b04876a66e156187f34b9ad320761dc65490b499c7131953855fafe8176840416132e6a99074f8aec3b4bc8865a89888b98ec2453fc474b9d07357a0
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e
-
Filesize
1.0MB
MD587baeb361ea0e4ba7d88502094d6f756
SHA1968b1b9b631bcd9b05851dffc5dd7948489d7816
SHA2565ced635268db0ebb6d58280f1f7367a148c818704911cda615c81fcf8c829589
SHA51211f4fe5ad45ccdcec5b45ec98e0d0e6a8af64823ce6719a298adc37b0a50145461ab946ffa364a01f5b6553502a9778bff0ad7d4c62d65efe28b42be64144a1e