Analysis
-
max time kernel
144s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 00:22
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
460f77900c1e81b099a33dd6b10963d0.exe
Resource
win7-20231129-en
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
460f77900c1e81b099a33dd6b10963d0.exe
Resource
win10v2004-20231215-en
4 signatures
150 seconds
General
-
Target
460f77900c1e81b099a33dd6b10963d0.exe
-
Size
89KB
-
MD5
460f77900c1e81b099a33dd6b10963d0
-
SHA1
ea149db23bf76be6731ba44a5d0cb2ac041e9e80
-
SHA256
c64fd74215f4e22e342a462fd5624b560f02eede4cfc7c592303386ce4f96241
-
SHA512
c930ee6685d217952997abd0371ac97f7385d635c3322ac77138a4a702418dde43b2d48b4cf1eb8bcfe66237e0bbfe5a2f904b86190aec24549c6cc2f4491954
-
SSDEEP
1536:GxDnjuexoxQELWKHgG6Ou0J05s5g7zBrPhmMAeb+FVzVXLwRhvP:G9iUoxnqKHgG6v0Jn5izBrPQMAeaFV5q
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2388 bandook.exe 3068 ali.exe -
Loads dropped DLL 6 IoCs
pid Process 2348 460f77900c1e81b099a33dd6b10963d0.exe 2348 460f77900c1e81b099a33dd6b10963d0.exe 2388 bandook.exe 2388 bandook.exe 2388 bandook.exe 3068 ali.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 460f77900c1e81b099a33dd6b10963d0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\ali.exe bandook.exe File opened for modification C:\Windows\SysWOW64\ali.exe bandook.exe File created C:\Windows\SysWOW64\ali.exe ali.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2348 wrote to memory of 2388 2348 460f77900c1e81b099a33dd6b10963d0.exe 15 PID 2388 wrote to memory of 3068 2388 bandook.exe 25 PID 2388 wrote to memory of 3068 2388 bandook.exe 25 PID 2388 wrote to memory of 3068 2388 bandook.exe 25 PID 2388 wrote to memory of 3068 2388 bandook.exe 25 PID 2388 wrote to memory of 3068 2388 bandook.exe 25 PID 2388 wrote to memory of 3068 2388 bandook.exe 25 PID 2388 wrote to memory of 3068 2388 bandook.exe 25
Processes
-
C:\Users\Admin\AppData\Local\Temp\460f77900c1e81b099a33dd6b10963d0.exe"C:\Users\Admin\AppData\Local\Temp\460f77900c1e81b099a33dd6b10963d0.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bandook.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\bandook.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\ali.exeC:\Windows\system32\ali.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
PID:3068
-
-