Analysis
-
max time kernel
140s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
02/11/2023, 07:39
Static task
static1
Behavioral task
behavioral1
Sample
installs.exe
Resource
win10v2004-20231023-en
General
-
Target
installs.exe
-
Size
375KB
-
MD5
2244407bb2d42d5f4eac695f41b6fb5f
-
SHA1
2ee287f5bf702944ced22a521be320e540a0dca0
-
SHA256
f0fdafa368b856b837a7f9ea91945e72f620792018f98626d9c44ef9ee948959
-
SHA512
02bce15c288b32f2cdf79dd45c456f9d30ba8fe75620430fd9bc9b2ba0b58ad9e37fc7f4d124e20d1d0fa9aae5a1f1c7127746b6b08fb7900640d7217f8543ac
-
SSDEEP
6144:+ahOvFMZQJEqHj1Yn8+JlxCEYDsXEdMRnGVSiGXPNP+veKI+0oj296D1p4I:+i+GZQK+S7JlwdMRs9GomK1S6DQI
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1816 arriveprospect.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" installs.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1816 arriveprospect.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1564 wrote to memory of 1816 1564 installs.exe 88 PID 1564 wrote to memory of 1816 1564 installs.exe 88 PID 1564 wrote to memory of 1816 1564 installs.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\installs.exe"C:\Users\Admin\AppData\Local\Temp\installs.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\arriveprospect.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\arriveprospect.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
431KB
MD56c39c3c2f069b9412dc555cbb94d4b50
SHA1cde852a5ec57a4a16783c20d0f08ed12bcbc10ec
SHA256cd467aaa6925086185f20083c6a2e382ea1b09c658d4173db8a8df21c6877858
SHA51263b0d52edd1de8cb8d86e58899220df68cd7c02e466251ace868fe7211f73d4c729e463b7426b8bb66c501fc2f61f5af7a1f3ba9cfd7d2468eb3c3883dd4d650
-
Filesize
431KB
MD56c39c3c2f069b9412dc555cbb94d4b50
SHA1cde852a5ec57a4a16783c20d0f08ed12bcbc10ec
SHA256cd467aaa6925086185f20083c6a2e382ea1b09c658d4173db8a8df21c6877858
SHA51263b0d52edd1de8cb8d86e58899220df68cd7c02e466251ace868fe7211f73d4c729e463b7426b8bb66c501fc2f61f5af7a1f3ba9cfd7d2468eb3c3883dd4d650