Analysis
-
max time kernel
144s -
max time network
134s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 05:09
Static task
static1
Behavioral task
behavioral1
Sample
56d39de5ab9a710c718893c9892f82a1.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
56d39de5ab9a710c718893c9892f82a1.exe
Resource
win10v2004-20231222-en
General
-
Target
56d39de5ab9a710c718893c9892f82a1.exe
-
Size
2.1MB
-
MD5
56d39de5ab9a710c718893c9892f82a1
-
SHA1
d6ddb0a2fda16180b2ccbd2f8533ec39d8df0750
-
SHA256
cffc9f38b735b1416052dc94bb05f10518e5e7bff3329c6af0fea234f9d71e6b
-
SHA512
654ae67641ed6f6e0d619e9bf2e40f068bb35bf2540c70f2a18ecc0bfde6e740addd90a5694446f2882e595492e6eb0344f558a51f9532073659cc5fee70dcf8
-
SSDEEP
49152:g+htcCi4I0V/ROqRFWk2ErQEySqgywGgTeVWw9ZchuYL0r/c:g+hvV/ROqR86yiDGRVYh3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4700 server2w.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 56d39de5ab9a710c718893c9892f82a1.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3924 wrote to memory of 4700 3924 56d39de5ab9a710c718893c9892f82a1.exe 18 PID 3924 wrote to memory of 4700 3924 56d39de5ab9a710c718893c9892f82a1.exe 18 PID 3924 wrote to memory of 4700 3924 56d39de5ab9a710c718893c9892f82a1.exe 18
Processes
-
C:\Users\Admin\AppData\Local\Temp\56d39de5ab9a710c718893c9892f82a1.exe"C:\Users\Admin\AppData\Local\Temp\56d39de5ab9a710c718893c9892f82a1.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3924 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2w.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server2w.exe2⤵
- Executes dropped EXE
PID:4700
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD53e3667107dac3770e84f2f246e0ecb05
SHA174b0c99f1b561e701ca8d769158fa39655e48c7a
SHA2568838d9efdcb52351e54af7ed403adfab35f24e9da4c4ecbaafd89391b40e5b8c
SHA5122d40075c6666411d4beb3cb2a448be39f2dacd6f6b77551a679023b69c3f49166833784b05ab5ffad17b98bf3ae66700700c955bcae3c37114840013cc0d90ad