Analysis
-
max time kernel
0s -
max time network
11s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
26/12/2023, 10:23
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
66ff87e56714ca6ce36c247749d25b8b.exe
Resource
win7-20231215-en
11 signatures
150 seconds
Behavioral task
behavioral2
Sample
66ff87e56714ca6ce36c247749d25b8b.exe
Resource
win10v2004-20231215-en
5 signatures
150 seconds
General
-
Target
66ff87e56714ca6ce36c247749d25b8b.exe
-
Size
680KB
-
MD5
66ff87e56714ca6ce36c247749d25b8b
-
SHA1
eda08481cb049ab43e32182a72fad007b38f1692
-
SHA256
e76ff4a68e6c6c030b32b73f630c7496ee8bbfd585ad2010b7244150429707f9
-
SHA512
346218c24ba38641f874d6ae0cbfde66bd52151f1b2fdeb465df782764453bd722c3e5216f0f359a91b0d95caeb06b2ec302b68d6891d2319c524982dec53c0b
-
SSDEEP
12288:Gu1s8wbQTxN2aNlPa7D5Lw95SkZPVHrtv2qTgUM1o7gFbb47pF:GlzbQVNL1gDqWkbrl9
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4856 3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 66ff87e56714ca6ce36c247749d25b8b.exe -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\program files\common files\microsoft shared\msinfo\Server.jpg 3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4888 wrote to memory of 4856 4888 66ff87e56714ca6ce36c247749d25b8b.exe 24 PID 4888 wrote to memory of 4856 4888 66ff87e56714ca6ce36c247749d25b8b.exe 24 PID 4888 wrote to memory of 4856 4888 66ff87e56714ca6ce36c247749d25b8b.exe 24
Processes
-
C:\Users\Admin\AppData\Local\Temp\66ff87e56714ca6ce36c247749d25b8b.exe"C:\Users\Admin\AppData\Local\Temp\66ff87e56714ca6ce36c247749d25b8b.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\3.exe2⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4856
-
-
C:\program files\common files\microsoft shared\msinfo\Server.exe"C:\program files\common files\microsoft shared\msinfo\Server.exe"1⤵PID:2456
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat2⤵PID:4660
-
-
C:\Windows\Hacker.com.cn.iniC:\Windows\Hacker.com.cn.ini1⤵PID:1808
-
C:\Program Files\Internet Explorer\IEXPLORE.EXE"C:\Program Files\Internet Explorer\IEXPLORE.EXE"2⤵PID:968
-