Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 04:17
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
5371e6dbfde78271bacebdb2ba061394.exe
Resource
win7-20231129-en
windows7-x64
6 signatures
150 seconds
Behavioral task
behavioral2
Sample
5371e6dbfde78271bacebdb2ba061394.exe
Resource
win10v2004-20231222-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
5371e6dbfde78271bacebdb2ba061394.exe
-
Size
170KB
-
MD5
5371e6dbfde78271bacebdb2ba061394
-
SHA1
b559283224f039ee08866104720cef002cc6d4d4
-
SHA256
34dc5e717a19b7e7cc8c57dd94e1440bc2d22f45ff2f8c8f74dc315cbb78c380
-
SHA512
1a6827932159cfa2d03385e9bd25c622e2a69c2f07648d257c6801dc6e8d10b8f46a9c34f81e4fad598190a71db08c3232cdbc75c5035ea176cff8252e03fc1b
-
SSDEEP
3072:7KNsB6jNa6kfaVSR5hTE8Rwdp0NSc3NBXRLxvUJeoSeCCDRlKc9:7Yq4HkfaMT5BNXLxPJeC
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1944 file.exe 2164 file.exe -
Loads dropped DLL 6 IoCs
pid Process 1684 5371e6dbfde78271bacebdb2ba061394.exe 1684 5371e6dbfde78271bacebdb2ba061394.exe 1944 file.exe 3028 WerFault.exe 3028 WerFault.exe 3028 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5371e6dbfde78271bacebdb2ba061394.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1944 set thread context of 2164 1944 file.exe 30 -
Program crash 1 IoCs
pid pid_target Process 3028 2164 WerFault.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1684 wrote to memory of 1944 1684 5371e6dbfde78271bacebdb2ba061394.exe 16 PID 1684 wrote to memory of 1944 1684 5371e6dbfde78271bacebdb2ba061394.exe 16 PID 1684 wrote to memory of 1944 1684 5371e6dbfde78271bacebdb2ba061394.exe 16 PID 1684 wrote to memory of 1944 1684 5371e6dbfde78271bacebdb2ba061394.exe 16 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 1944 wrote to memory of 2164 1944 file.exe 30 PID 2164 wrote to memory of 3028 2164 file.exe 29 PID 2164 wrote to memory of 3028 2164 file.exe 29 PID 2164 wrote to memory of 3028 2164 file.exe 29 PID 2164 wrote to memory of 3028 2164 file.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\5371e6dbfde78271bacebdb2ba061394.exe"C:\Users\Admin\AppData\Local\Temp\5371e6dbfde78271bacebdb2ba061394.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\file.exe3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 1281⤵
- Loads dropped DLL
- Program crash
PID:3028