Analysis
-
max time kernel
138s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25/12/2023, 16:45
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2e404029e99d2a78790b45bcefc41d08.exe
Resource
win7-20231215-en
7 signatures
150 seconds
Behavioral task
behavioral2
Sample
2e404029e99d2a78790b45bcefc41d08.exe
Resource
win10v2004-20231215-en
6 signatures
150 seconds
General
-
Target
2e404029e99d2a78790b45bcefc41d08.exe
-
Size
1.5MB
-
MD5
2e404029e99d2a78790b45bcefc41d08
-
SHA1
db3f2986ba0b6454b23d7125da364449c07cf135
-
SHA256
51f86163a42d075e226d7cfdab67ea6ff876f986c6ce20c35ab6cfc85cadb53a
-
SHA512
97a4b7d72d906f17eb2b3027dfb3852b753423ad0a14fb1b2528ce6a35e5b660a53824e1450111ab2232efab56a7ff37068452dda00a28bad3ed832fa690c765
-
SSDEEP
24576:c08eEfXxOuxjBNd5nrBxfk71tpqPvFQBGZvT3akwgvLJZDcOLNiMHpjL5:N8LfX9jhBxsoPvFQor3a/sLJZDckNHpZ
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 312 FACEBO~1.EXE 1096 Driver.exe 4640 COPIED~1.EXE -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 2e404029e99d2a78790b45bcefc41d08.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" FACEBO~1.EXE -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll FACEBO~1.EXE File created C:\Windows\SysWOW64\ADVAPI32.dll FACEBO~1.EXE File opened for modification C:\Windows\SysWOW64\COMCTL32.dll FACEBO~1.EXE File created C:\Windows\SysWOW64\COMCTL32.dll FACEBO~1.EXE File opened for modification C:\Windows\SysWOW64\VERSION.dll FACEBO~1.EXE File created C:\Windows\SysWOW64\VERSION.dll FACEBO~1.EXE -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1096 Driver.exe 1096 Driver.exe 1096 Driver.exe 1096 Driver.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4640 COPIED~1.EXE 4640 COPIED~1.EXE -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 1536 wrote to memory of 312 1536 2e404029e99d2a78790b45bcefc41d08.exe 26 PID 1536 wrote to memory of 312 1536 2e404029e99d2a78790b45bcefc41d08.exe 26 PID 1536 wrote to memory of 312 1536 2e404029e99d2a78790b45bcefc41d08.exe 26 PID 312 wrote to memory of 1096 312 FACEBO~1.EXE 28 PID 312 wrote to memory of 1096 312 FACEBO~1.EXE 28 PID 312 wrote to memory of 1096 312 FACEBO~1.EXE 28 PID 1096 wrote to memory of 3428 1096 Driver.exe 49 PID 1096 wrote to memory of 3428 1096 Driver.exe 49 PID 1096 wrote to memory of 3428 1096 Driver.exe 49 PID 1096 wrote to memory of 3428 1096 Driver.exe 49 PID 1536 wrote to memory of 4640 1536 2e404029e99d2a78790b45bcefc41d08.exe 99 PID 1536 wrote to memory of 4640 1536 2e404029e99d2a78790b45bcefc41d08.exe 99 PID 1536 wrote to memory of 4640 1536 2e404029e99d2a78790b45bcefc41d08.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\2e404029e99d2a78790b45bcefc41d08.exe"C:\Users\Admin\AppData\Local\Temp\2e404029e99d2a78790b45bcefc41d08.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FACEBO~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FACEBO~1.EXE2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:312 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Driver.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\Driver.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\COPIED~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\COPIED~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4640
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3428