Analysis
-
max time kernel
147s -
max time network
137s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 23:37
Static task
static1
Behavioral task
behavioral1
Sample
43b603fdf279f8a4e4452e7ad280affa.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
43b603fdf279f8a4e4452e7ad280affa.exe
Resource
win10v2004-20231215-en
General
-
Target
43b603fdf279f8a4e4452e7ad280affa.exe
-
Size
726KB
-
MD5
43b603fdf279f8a4e4452e7ad280affa
-
SHA1
75dcdbbfe881342a98336da25bbf2e25f3e9ecef
-
SHA256
d483d5f6e47ddb2b45841f4dc4f9cd758b99876afac85e4ed1a9bf0b16b19aa0
-
SHA512
c80905da4d2875f972e1c72e84f48f88ae7735c091b98887ea370f40c6a042f2b5b28188744449e0f447c4eb15b7ff82160f7d255ca06b816814019e4240a21f
-
SSDEEP
12288:IPBFQQpwv38hx2M4f6qcOmBR7v5RPMNtOZbpgzDqF3Z4mxxLDqVTVOCW:IPBFQQpwvY926qDEzz++VUWQmXCVTzW
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2220 4.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 43b603fdf279f8a4e4452e7ad280affa.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1520 2220 WerFault.exe 18 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1596 wrote to memory of 2220 1596 43b603fdf279f8a4e4452e7ad280affa.exe 18 PID 1596 wrote to memory of 2220 1596 43b603fdf279f8a4e4452e7ad280affa.exe 18 PID 1596 wrote to memory of 2220 1596 43b603fdf279f8a4e4452e7ad280affa.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\43b603fdf279f8a4e4452e7ad280affa.exe"C:\Users\Admin\AppData\Local\Temp\43b603fdf279f8a4e4452e7ad280affa.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2683⤵
- Program crash
PID:1520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2220 -ip 22201⤵PID:1484
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
346KB
MD5d8f82b437ec2622224c6771f67e2e652
SHA174a05f069f3458dcaded89004887de1658a96d27
SHA256459cdec6b1724e54eb5783f71ee81eeed84a877ccb544663f6c84cf260ec8b68
SHA512f05ae65a107d89d0b4541bddb27d3c5ebb234a7be55e860ffe25c8318c58a60376be9b8baee390d5a4ab1663ea9c770809a87ffc367620087b937476e33ece1c