Analysis
-
max time kernel
173s -
max time network
185s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 09:57
Static task
static1
Behavioral task
behavioral1
Sample
1594805542139a1a3c2cbb4198c6a132.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1594805542139a1a3c2cbb4198c6a132.exe
Resource
win10v2004-20231215-en
General
-
Target
1594805542139a1a3c2cbb4198c6a132.exe
-
Size
1.8MB
-
MD5
1594805542139a1a3c2cbb4198c6a132
-
SHA1
25e80281c412b64a77851c5a1b0c20e9f71f2d6f
-
SHA256
e6e87c97aac2106d9628c18356e9251bfcca7a8c6ee32dd32bdbc90db2bacbee
-
SHA512
4319312d187f8e5c8c2f9d557d6967677179d20df63065c719ff2e02ed69401b792ac8cdcf4580b7dc594edd1b7637f506df776afa2af4c95d4572f23a9cb67e
-
SSDEEP
49152:GkZIZRu9fg2ZSy2BqmdEPMsziQfiM61GRSgVmd:lf1aB1EEszFqd1GRRVm
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 5020 patched.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 1594805542139a1a3c2cbb4198c6a132.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 5020 patched.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 5112 wrote to memory of 5020 5112 1594805542139a1a3c2cbb4198c6a132.exe 91 PID 5112 wrote to memory of 5020 5112 1594805542139a1a3c2cbb4198c6a132.exe 91 PID 5112 wrote to memory of 5020 5112 1594805542139a1a3c2cbb4198c6a132.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1594805542139a1a3c2cbb4198c6a132.exe"C:\Users\Admin\AppData\Local\Temp\1594805542139a1a3c2cbb4198c6a132.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\patched.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:5020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD5cabe66a2fa826f42443bb8acbb6a6d3c
SHA12daed47df7d901898838f1e94f8bb01d615ea1c2
SHA256e2effd4a2fdad2fab4b1cba4a1d0f485e5016c99a6488501fd5a44a916e0a620
SHA5127f90c19c340ba5d30c8eb30583ff6caf4fbf411027775be6978f8bc5e9feaaec6cc87c8f05d0613c8e6fda218d4262f108743a4c123687e8c3baebabbb936e28