Analysis
-
max time kernel
84s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231020-en -
resource tags
arch:x64arch:x86image:win10v2004-20231020-enlocale:en-usos:windows10-2004-x64system -
submitted
14-11-2023 11:56
Static task
static1
Behavioral task
behavioral1
Sample
d7330b5bf5d11776b9e85f164ed4dbac.exe
Resource
win10v2004-20231020-en
General
-
Target
d7330b5bf5d11776b9e85f164ed4dbac.exe
-
Size
1.4MB
-
MD5
d7330b5bf5d11776b9e85f164ed4dbac
-
SHA1
015c901c53b25b57dcc87b3717ee551bc8e20d77
-
SHA256
c9c5798e7a3d4bd33f48a62c21591a50d890d25d509aa359798720ea4ba3fb14
-
SHA512
b4298c4011a35302d7ead43d579244983ec644f41a012edf2264003e4faed2f17794853c4b17788ce4bac57bbd4dfa59736a09134819361742337cce7b783e4f
-
SSDEEP
24576:vy4U3y8WzlCuqdxiatvvNgx9S7cceR3JYeLZk7dLdAgPe5shtj5uTmBeiz:64aazUuUiat3FwZ9vdkFOg/tluT+ei
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 2732 yM2YT12.exe 3948 Ql6xK32.exe 3420 Bz7jI06.exe 2288 2jT4953.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" yM2YT12.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup2 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP002.TMP\\\"" Ql6xK32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup3 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP003.TMP\\\"" Bz7jI06.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" d7330b5bf5d11776b9e85f164ed4dbac.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 208 wrote to memory of 2732 208 d7330b5bf5d11776b9e85f164ed4dbac.exe 88 PID 208 wrote to memory of 2732 208 d7330b5bf5d11776b9e85f164ed4dbac.exe 88 PID 208 wrote to memory of 2732 208 d7330b5bf5d11776b9e85f164ed4dbac.exe 88 PID 2732 wrote to memory of 3948 2732 yM2YT12.exe 89 PID 2732 wrote to memory of 3948 2732 yM2YT12.exe 89 PID 2732 wrote to memory of 3948 2732 yM2YT12.exe 89 PID 3948 wrote to memory of 3420 3948 Ql6xK32.exe 91 PID 3948 wrote to memory of 3420 3948 Ql6xK32.exe 91 PID 3948 wrote to memory of 3420 3948 Ql6xK32.exe 91 PID 3420 wrote to memory of 2288 3420 Bz7jI06.exe 92 PID 3420 wrote to memory of 2288 3420 Bz7jI06.exe 92 PID 3420 wrote to memory of 2288 3420 Bz7jI06.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7330b5bf5d11776b9e85f164ed4dbac.exe"C:\Users\Admin\AppData\Local\Temp\d7330b5bf5d11776b9e85f164ed4dbac.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:208 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\yM2YT12.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Ql6xK32.exe3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exeC:\Users\Admin\AppData\Local\Temp\IXP002.TMP\Bz7jI06.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3420 -
C:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exeC:\Users\Admin\AppData\Local\Temp\IXP003.TMP\2jT4953.exe5⤵
- Executes dropped EXE
PID:2288
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD509f8b3a4c2a3cb91150e2b5e74212b62
SHA1d0fe0a9a50c82b8436d6e588c78a886583ca5031
SHA25619a86cb2947215e3f2ee9be13f72ed40290ecf08400a5603ac0cbdd17be1217c
SHA5121908883c7cfd20f2819d6079c13209c33bdbde32c3705ddd1cd5bcfcd0160f8a45734ef64c3662a002ac7e12d32cc02ff25bf94518b52530bc29d0708eec7d74
-
Filesize
1.2MB
MD509f8b3a4c2a3cb91150e2b5e74212b62
SHA1d0fe0a9a50c82b8436d6e588c78a886583ca5031
SHA25619a86cb2947215e3f2ee9be13f72ed40290ecf08400a5603ac0cbdd17be1217c
SHA5121908883c7cfd20f2819d6079c13209c33bdbde32c3705ddd1cd5bcfcd0160f8a45734ef64c3662a002ac7e12d32cc02ff25bf94518b52530bc29d0708eec7d74
-
Filesize
1.0MB
MD5ecf343a0532408e403bd17e3ac517e09
SHA1e63969192489900f00e9e2b393b6ea2c8b4b60b7
SHA2565bad96daa191ea08b6f3c8731213ee6ea29405017bda92602a32d1e281dbb78d
SHA512965df7ac340596448e01a6836483e7c7f3e4283f1f57f2b12d11531caf9ad228a08111f231fd55287bfaaf5d508a374e1656511b791b852f7ffa462bbc95d5cf
-
Filesize
1.0MB
MD5ecf343a0532408e403bd17e3ac517e09
SHA1e63969192489900f00e9e2b393b6ea2c8b4b60b7
SHA2565bad96daa191ea08b6f3c8731213ee6ea29405017bda92602a32d1e281dbb78d
SHA512965df7ac340596448e01a6836483e7c7f3e4283f1f57f2b12d11531caf9ad228a08111f231fd55287bfaaf5d508a374e1656511b791b852f7ffa462bbc95d5cf
-
Filesize
423KB
MD50d65e7f1455323fad50d4bdcdfdab90c
SHA1e653481e5115e290cebdb9cdf970ba5962a038a6
SHA2568bf0a852ec6ec638519ae08a38acf835fd7038f7e1d9752ca83d493955992f2b
SHA51247a4a7bb46fefd8d09e4a37426995099f1e670b3f33e5b5450e120682f7b76582ea25b0c446ed55cf6e3217c435b41fe4e4db39f2c70886c7d6c4eff0b6987ec
-
Filesize
423KB
MD50d65e7f1455323fad50d4bdcdfdab90c
SHA1e653481e5115e290cebdb9cdf970ba5962a038a6
SHA2568bf0a852ec6ec638519ae08a38acf835fd7038f7e1d9752ca83d493955992f2b
SHA51247a4a7bb46fefd8d09e4a37426995099f1e670b3f33e5b5450e120682f7b76582ea25b0c446ed55cf6e3217c435b41fe4e4db39f2c70886c7d6c4eff0b6987ec
-
Filesize
414KB
MD5a7da70102c9cbc310e550ab81b8c5932
SHA1119c3c97d02d954f8173ab0a6bf31727a85399e2
SHA2565ba39a95a06375a01212ca8b9e173d5f1b848ae5a41e7538f29f15d35830728d
SHA5122700099be8df141b8030ed266010328ab847396dbc1cc8dd23d07d8ff0bfca9d30ef37eae891c16543227a24b32fb15b495964b3e0a96ff69b49abc1d529a392
-
Filesize
414KB
MD5a7da70102c9cbc310e550ab81b8c5932
SHA1119c3c97d02d954f8173ab0a6bf31727a85399e2
SHA2565ba39a95a06375a01212ca8b9e173d5f1b848ae5a41e7538f29f15d35830728d
SHA5122700099be8df141b8030ed266010328ab847396dbc1cc8dd23d07d8ff0bfca9d30ef37eae891c16543227a24b32fb15b495964b3e0a96ff69b49abc1d529a392