Analysis
-
max time kernel
140s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-12-2023 09:57
Static task
static1
Behavioral task
behavioral1
Sample
1594805542139a1a3c2cbb4198c6a132.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1594805542139a1a3c2cbb4198c6a132.exe
Resource
win10v2004-20231215-en
General
-
Target
1594805542139a1a3c2cbb4198c6a132.exe
-
Size
1.8MB
-
MD5
1594805542139a1a3c2cbb4198c6a132
-
SHA1
25e80281c412b64a77851c5a1b0c20e9f71f2d6f
-
SHA256
e6e87c97aac2106d9628c18356e9251bfcca7a8c6ee32dd32bdbc90db2bacbee
-
SHA512
4319312d187f8e5c8c2f9d557d6967677179d20df63065c719ff2e02ed69401b792ac8cdcf4580b7dc594edd1b7637f506df776afa2af4c95d4572f23a9cb67e
-
SSDEEP
49152:GkZIZRu9fg2ZSy2BqmdEPMsziQfiM61GRSgVmd:lf1aB1EEszFqd1GRRVm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1792 patched.exe -
Loads dropped DLL 1 IoCs
pid Process 2216 1594805542139a1a3c2cbb4198c6a132.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1594805542139a1a3c2cbb4198c6a132.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1792 patched.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16 PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16 PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16 PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16 PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16 PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16 PID 2216 wrote to memory of 1792 2216 1594805542139a1a3c2cbb4198c6a132.exe 16
Processes
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792
-
C:\Users\Admin\AppData\Local\Temp\1594805542139a1a3c2cbb4198c6a132.exe"C:\Users\Admin\AppData\Local\Temp\1594805542139a1a3c2cbb4198c6a132.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
384KB
MD5e4093ea08a30539f80c1ebe0275431b1
SHA16e0d16eb145174651d734b5ebfb22dbbfff63e4e
SHA2562517281fff24ac1c41f41d79887ecc3b53863e0487a29eecb56ba926280d486a
SHA51235dd518d3bf11ac6378e2f390967abd79d450f525ef26e2f8244cf2bf7de206ec551b1b58587adcae9ec70d5e479f398b2a8d931bfb07d74ce19118c2eacb3a8
-
Filesize
385KB
MD5b5d0bbe8208cbc7b5bfa73ebd3d48f7e
SHA140a09b6af93097e2fe4baa8918ce8f9b1ee790b9
SHA256afe296786742af3ad366a0aa8d263e253a01b007780239f0c5a3dab1e7789c3e
SHA512339b88396bf8750989a80111d1522d8b5ea0a86d764c2721b4eb180123db8475e9ba039a7e5a29926c016153568a649d24fbad1554783849f422bac657ba85a2
-
Filesize
897KB
MD5cfa6db02d11865dcaa3fd8cb3de907c4
SHA121bee2bb0b56e2c6092325656b92c3d95ec55163
SHA256e65bc3d92ab6ded05ecbd00eea7bbef0e8ddaf8b41027d965320bd4c7a90d707
SHA51239ad869a702bbdd4b3cba1109a58edfaca383c82ebdf6ae103d655582a44dd30494894be02101c63fdaf3aaaa87e9503ba9a850175fb6180a1713391c6a8fdc6