Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 20:13
Static task
static1
Behavioral task
behavioral1
Sample
101a1f29a5090087fe35a759eb7c94b6.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
101a1f29a5090087fe35a759eb7c94b6.exe
Resource
win10v2004-20231222-en
General
-
Target
101a1f29a5090087fe35a759eb7c94b6.exe
-
Size
14.9MB
-
MD5
101a1f29a5090087fe35a759eb7c94b6
-
SHA1
45f7cc9f39e22a6cc37fad0b8480692bf4124c36
-
SHA256
2f376a89c28d4002957d19e1a5945724ccc842c0b9d3fa619f42657ffc910fa6
-
SHA512
fa2f942e733fce3b7861fff2d07cec01105a5ddf53fba9498aa385217e060ba87cb87159469aa66e68d86470223f99f97b4483ad368d08fb587af8e06ed6410a
-
SSDEEP
393216:8RjeAy6tGbfjw3r+2S7avZ1vRK49ECOQIMnc:wLtGSaL7arj9EWIuc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3060 vcredist_x64.exe 2272 vcredist_x64.exe -
Loads dropped DLL 2 IoCs
pid Process 3060 vcredist_x64.exe 2272 vcredist_x64.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 101a1f29a5090087fe35a759eb7c94b6.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Suspicious behavior: CmdExeWriteProcessMemorySpam 1 IoCs
pid Process 3060 vcredist_x64.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 2040 wrote to memory of 3024 2040 101a1f29a5090087fe35a759eb7c94b6.exe 21 PID 2040 wrote to memory of 3024 2040 101a1f29a5090087fe35a759eb7c94b6.exe 21 PID 2040 wrote to memory of 3024 2040 101a1f29a5090087fe35a759eb7c94b6.exe 21 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3024 wrote to memory of 3060 3024 cmd.exe 29 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28 PID 3060 wrote to memory of 2272 3060 vcredist_x64.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\101a1f29a5090087fe35a759eb7c94b6.exe"C:\Users\Admin\AppData\Local\Temp\101a1f29a5090087fe35a759eb7c94b6.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Windows\system32\cmd.execmd.exe /c "setup.bat"2⤵
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exevcredist_x64.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: CmdExeWriteProcessMemorySpam
- Suspicious use of WriteProcessMemory
PID:3060
-
-
-
C:\Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe"C:\Windows\Temp\{D5E2128C-4B8D-40DE-B117-414E478A88AA}\.cr\vcredist_x64.exe" -burn.clean.room="C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\vcredist_x64.exe" -burn.filehandle.attached=180 -burn.filehandle.self=1881⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2272
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
37B
MD5ee5b968cbf9dd2ca42239b02acbc2db7
SHA1985e71cc0b32a6b6288ddd04bda7f69b0ba4e0cd
SHA2563453ba6b867ab90d8ca0b07150742bad54f4b99a2e0c7b540ce75f9d6ba993a8
SHA512b3c6317e760b1a62a1564bf78d72985cb0ba0b19a243ff0777c4e72f66c2f2c90538b75b183f68806d7fd6d259935de2598cbee41070d4d6f3d86ea552671694
-
Filesize
221KB
MD59b6870c8a7433ca7df4a15eeaf4a7861
SHA1abffcacc56fc2674cfc3a43960887538b17a7102
SHA2566749e658ff957ef0acf70ab22eb3e186f9d4c03a0b791301926d1958ea53468f
SHA51258d62f29a286afa4924bc43fe378b0722e33e5c569365f465e5ef83ce278d2126cae0a8ff40b38feac467e02c731bde30cf45efb473718f841e45bc451cf0dfc
-
Filesize
189KB
MD5cf1a0733c934b2d390bd1c75cee8ba40
SHA14d552781da2a701e80a29f0029db9a87dd50c49d
SHA25636990828602a38e4baf7f57cf7956ed99dc9954018a34ffd5f2062dbd4cfa279
SHA5125a2d5aa2ed67ad25d2a2ea3ba1689aaceca1641972a7886aa2520e52c9484b83669f67da7a479dbd395b93753c0cf4d024e2c52ba6a25e387ee9c9a0bb36abda
-
Filesize
1KB
MD5d6bd210f227442b3362493d046cea233
SHA1ff286ac8370fc655aea0ef35e9cf0bfcb6d698de
SHA256335a256d4779ec5dcf283d007fb56fd8211bbcaf47dcd70fe60ded6a112744ef
SHA512464aaab9e08de610ad34b97d4076e92dc04c2cdc6669f60bfc50f0f9ce5d71c31b8943bd84cee1a04fb9ab5bbed3442bd41d9cb21a0dd170ea97c463e1ce2b5b
-
Filesize
82KB
MD5e5ec12efaf20c9b7b50c23f06ba2e4ad
SHA122e9e7e80512ba6365b61155be767b744e01a2b3
SHA256776d582d06ce492869150c66c729379cb2798ac1b04e9e24c55ba0a5b7c2c75a
SHA512d0bd69a78823dd6b5f7fd9d99eecc69bc92ef109c7963c1e2491bbc27d9052c6ec71e639d800296733be2f4a4cb5da58d3d65b23a27113529c8ebd50731d4a06
-
Filesize
138KB
MD5e115ad4a9d11e5a528e3a4d2bf6cf020
SHA14a76228025c97209382b89030b1aaf6c093777ba
SHA256e177078607db25bdaf8dfe98608a9f24c7932debd0082f59a2e1b248414edddb
SHA5123c17c5579e7a18e961210d71389c99a207a978f64a27646bffbb484e8e0467cf41de1b8f486dbf8b549e8745eb37cae0a264780f10a82ed9e663b0032c469389
-
Filesize
129KB
MD54ce40e1824f1c5485585b2f3f8ce0134
SHA1497ab63876e38be76748d5c2a0bd369a24a8d398
SHA25684bb764f8d0c476564c4b177e9820d41deaa480f58c9a02d601e4a18900ba939
SHA512b51c831c307ef04097605308adec94df98d99642ec304ba9bee0f9f167f2efb7cfa5255b36cb26bb73f2d24bdfd77b71752d5747b8df6a0f74f31ecff2566233
-
Filesize
125KB
MD56df9b0b336460cb9be610bffb1dedd13
SHA1db3aeea2d7f6b675e48ae3aeca500637bd04b91f
SHA2569eca112621462252234c4e3eba29cc0bcb8ae9ad6addb3178a2f07df24d46d6b
SHA512c3ed52029d040cf77aed1f4a6b053f5b4ed6875aa76915a0046ec48359771e9c28e6b3b534425dad9a60ad6083f03c62ede05bf0e4417d9adfd33403e1fba30e