Analysis
-
max time kernel
162s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25/12/2023, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
43b603fdf279f8a4e4452e7ad280affa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43b603fdf279f8a4e4452e7ad280affa.exe
Resource
win10v2004-20231215-en
General
-
Target
43b603fdf279f8a4e4452e7ad280affa.exe
-
Size
726KB
-
MD5
43b603fdf279f8a4e4452e7ad280affa
-
SHA1
75dcdbbfe881342a98336da25bbf2e25f3e9ecef
-
SHA256
d483d5f6e47ddb2b45841f4dc4f9cd758b99876afac85e4ed1a9bf0b16b19aa0
-
SHA512
c80905da4d2875f972e1c72e84f48f88ae7735c091b98887ea370f40c6a042f2b5b28188744449e0f447c4eb15b7ff82160f7d255ca06b816814019e4240a21f
-
SSDEEP
12288:IPBFQQpwv38hx2M4f6qcOmBR7v5RPMNtOZbpgzDqF3Z4mxxLDqVTVOCW:IPBFQQpwvY926qDEzz++VUWQmXCVTzW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2408 4.exe -
Loads dropped DLL 5 IoCs
pid Process 3068 43b603fdf279f8a4e4452e7ad280affa.exe 3068 43b603fdf279f8a4e4452e7ad280affa.exe 2860 WerFault.exe 2860 WerFault.exe 2860 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43b603fdf279f8a4e4452e7ad280affa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2860 2408 WerFault.exe 27 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2408 3068 43b603fdf279f8a4e4452e7ad280affa.exe 27 PID 3068 wrote to memory of 2408 3068 43b603fdf279f8a4e4452e7ad280affa.exe 27 PID 3068 wrote to memory of 2408 3068 43b603fdf279f8a4e4452e7ad280affa.exe 27 PID 3068 wrote to memory of 2408 3068 43b603fdf279f8a4e4452e7ad280affa.exe 27 PID 2408 wrote to memory of 2860 2408 4.exe 28 PID 2408 wrote to memory of 2860 2408 4.exe 28 PID 2408 wrote to memory of 2860 2408 4.exe 28 PID 2408 wrote to memory of 2860 2408 4.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b603fdf279f8a4e4452e7ad280affa.exe"C:\Users\Admin\AppData\Local\Temp\43b603fdf279f8a4e4452e7ad280affa.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 883⤵
- Loads dropped DLL
- Program crash
PID:2860
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5d8f82b437ec2622224c6771f67e2e652
SHA174a05f069f3458dcaded89004887de1658a96d27
SHA256459cdec6b1724e54eb5783f71ee81eeed84a877ccb544663f6c84cf260ec8b68
SHA512f05ae65a107d89d0b4541bddb27d3c5ebb234a7be55e860ffe25c8318c58a60376be9b8baee390d5a4ab1663ea9c770809a87ffc367620087b937476e33ece1c