Analysis
-
max time kernel
140s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
24/12/2023, 15:59
Static task
static1
Behavioral task
behavioral1
Sample
04a3ec3cd511e044c5cb1bcef4a0a38c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
04a3ec3cd511e044c5cb1bcef4a0a38c.exe
Resource
win10v2004-20231215-en
General
-
Target
04a3ec3cd511e044c5cb1bcef4a0a38c.exe
-
Size
1.1MB
-
MD5
04a3ec3cd511e044c5cb1bcef4a0a38c
-
SHA1
dd8f168bf9f4a31ca1191986293b48bbaba68fdc
-
SHA256
e826dcb72561c592c31a3de72b315c872733a6beb2f00bc736d43a62f77d993b
-
SHA512
df816b06203cba883605f1e46cd3c20988bf6e42c7cb46e2db885d880de993faa13bd8e0fecaaabeb243c699789c469d531b57c1b4cf5a7f1918f90e8970c774
-
SSDEEP
24576:yTjd8EHRD/uFroZKzX/1nnO/1hcBpaKpd9gr4ZrQmX/qYLAeh:4d8O5/ut7dnOthcBpaSMoMmSEFh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2496 QQEXPL~1.EXE -
Loads dropped DLL 2 IoCs
pid Process 2144 04a3ec3cd511e044c5cb1bcef4a0a38c.exe 2144 04a3ec3cd511e044c5cb1bcef4a0a38c.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 04a3ec3cd511e044c5cb1bcef4a0a38c.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2496 QQEXPL~1.EXE -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2496 2144 04a3ec3cd511e044c5cb1bcef4a0a38c.exe 28 PID 2144 wrote to memory of 2496 2144 04a3ec3cd511e044c5cb1bcef4a0a38c.exe 28 PID 2144 wrote to memory of 2496 2144 04a3ec3cd511e044c5cb1bcef4a0a38c.exe 28 PID 2144 wrote to memory of 2496 2144 04a3ec3cd511e044c5cb1bcef4a0a38c.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\04a3ec3cd511e044c5cb1bcef4a0a38c.exe"C:\Users\Admin\AppData\Local\Temp\04a3ec3cd511e044c5cb1bcef4a0a38c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QQEXPL~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\QQEXPL~1.EXE2⤵
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
265KB
MD51deeaab805ebe9b084056c8d00ed037c
SHA12a4ed9e7a91e20e96e5c6148cbe01b097e4e6f09
SHA256de31809ade3e3f17ee93bd810f379e8429cfa309a008d85b0210d7f29a072335
SHA51298aa0ec81beb9ef55785ec1f40ee0a9114d9af44e11aca49ff34924a0fa635a14ba06d51012a99e1ca1d9e72b193bb3a73df49f26776cbd447ebc240b58a8993
-
Filesize
228KB
MD53bf4ed6b65f88535616b3ceb4fe54b2b
SHA1eeee439d74e3189b5848990da34d5722f8293898
SHA256c7fcfa8439a5e40cb5dc587200a0a862d25bfd9716e336aff4c1112bf72279c8
SHA512630232d9dc307607f6cbe0f92a83c58a8e83402c633e4f18f4bac39817c7ddf521be74305b5f6d033bf4c1feeb226f8fa1ea70279f03f5b3c883132f8036d798
-
Filesize
255KB
MD568ec72a14fa8f8324b4a6e4ccb88032e
SHA19248b20820fd52770e9c9844879fc467d468fbc3
SHA256de3eb80bad4d857db9ac709abb68d33d8bd7f10ae9134ae908efe80e7d6c5d72
SHA512393eac22ac6777ce812308e14567954096a15319775fd4b8f45ca46ed917aa29b0f36513f2ecca080817ee5712fb078eff36ac5453b13df0191c83339d233587
-
Filesize
170KB
MD55577f7c200ed78a1418dc32fc1dc6266
SHA10c7e3822bdaa99c8e989b1b618834c38f7727caf
SHA2563584b33517bb18046a05658864e5d557ec2338d20fd92b889cbeeaa57f713845
SHA5123dcd61b1a4d54299bcac3627d2b33a311482194331f4f4d01b6287df7fda6232f89e632998b0c8c3cf22db489d534de8ebed413c69360674704806bd3d1bcd9f