Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28/12/2023, 20:30
Static task
static1
Behavioral task
behavioral1
Sample
f61529037f2797ba220ad590ab75f524.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
f61529037f2797ba220ad590ab75f524.exe
Resource
win10v2004-20231222-en
General
-
Target
f61529037f2797ba220ad590ab75f524.exe
-
Size
742KB
-
MD5
f61529037f2797ba220ad590ab75f524
-
SHA1
6d8ef255f14110f8da3fc28fb98361768cbcbafb
-
SHA256
40faadf5f6cfa52935883b71c6d25567faa8e7aa336012366ab9efb9d2177d2c
-
SHA512
4ab0809c929abf4797e55bcf1c9bf63c541e13fe7f41533d3462257a7d04fd17007c6e4bf1f41379a8a11909afb2ff3a1eed0c21091fba791106cf145538877a
-
SSDEEP
12288:rWr9bbFmtq6uI0UrzuUKNfaqBjuG0MCtHuFPxhwY1+uzlJMA4O8c5geV:rWhBmiIfXwNCvBwhwck2P5gy
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2728 rinst.exe 3056 ISTIRAP.exe 2604 bpk.exe -
Loads dropped DLL 21 IoCs
pid Process 2188 f61529037f2797ba220ad590ab75f524.exe 2188 f61529037f2797ba220ad590ab75f524.exe 2728 rinst.exe 2728 rinst.exe 2728 rinst.exe 2728 rinst.exe 2728 rinst.exe 3056 ISTIRAP.exe 3056 ISTIRAP.exe 3056 ISTIRAP.exe 2728 rinst.exe 2728 rinst.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2140 WerFault.exe 2140 WerFault.exe 2188 f61529037f2797ba220ad590ab75f524.exe 2140 WerFault.exe 2140 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\bpk = "C:\\WINDOWS\\SysWOW64\\bpk.exe" bpk.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\WINDOWS\SysWOW64\pk.bin rinst.exe File created C:\WINDOWS\SysWOW64\bpk.exe rinst.exe File created C:\WINDOWS\SysWOW64\bpkhk.dll rinst.exe File created C:\WINDOWS\SysWOW64\inst.dat rinst.exe File created C:\WINDOWS\SysWOW64\rinst.exe rinst.exe File opened for modification C:\WINDOWS\SysWOW64\pk.bin bpk.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2140 3056 WerFault.exe 29 -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 2604 bpk.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe 2604 bpk.exe -
Suspicious use of WriteProcessMemory 28 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2188 wrote to memory of 2728 2188 f61529037f2797ba220ad590ab75f524.exe 28 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 3056 2728 rinst.exe 29 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 2728 wrote to memory of 2604 2728 rinst.exe 30 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31 PID 3056 wrote to memory of 2140 3056 ISTIRAP.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\f61529037f2797ba220ad590ab75f524.exe"C:\Users\Admin\AppData\Local\Temp\f61529037f2797ba220ad590ab75f524.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\rinst.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\RarSFX0\ISTIRAP.exe"C:\Users\Admin\AppData\Local\Temp\RarSFX0\ISTIRAP.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3056 -s 3844⤵
- Loads dropped DLL
- Program crash
PID:2140
-
-
-
C:\WINDOWS\SysWOW64\bpk.exeC:\WINDOWS\system32\bpk.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
242KB
MD5d7bb223c7cd79667337817f9aceb03ae
SHA1e8041fea371f16a2d926d2992a9f8cf0e4098d13
SHA256935958d5d21d954ae4d1b0bbeb81a8b2dc089e0585c49f3770217c2dfcc8281c
SHA512a462144a184fa2a4feb6e5e6e1c02f6716510a441bf7149f72b4427a975e2719eb40facd79530c93529c675e18ffac21b28cc0977e2b7d193d91d0736c708cb8
-
Filesize
223KB
MD5448ff693721a98fc0eebbf347760730c
SHA1d5d2e422eb8dcb0f91848f00f887bb137fb28de0
SHA256ea4329e3fb8767976a523069cbff073158d8ef43a921f50c50797336752a6877
SHA512e25747b335697093ac263916e8165e85961c017b46a8e4ad6d9e3b0ec1d084644e726f02d68cadc078079bbe7e5b1ec84a353715d43376cbbb294d823a55ed01
-
Filesize
117KB
MD5212e027f956bc3d0e52115e5642455b6
SHA1a9b41736867c0d5ef45c09a9a30fb72832da0110
SHA25653d945e2d7fcd9ebbe118c9af20cebc49ddea051864634b894f7607861f5476b
SHA512bf976356eee4b705eb4f4af9729ff53230b1e786c1aff4ba42c18260f8a294f27e72c9bbd78281799e59ba4ce23137e7301d721617e7d12247310157496225c9
-
Filesize
21KB
MD5908dd7421e90ef30c8b90c8eb57cab07
SHA1d74a0a42f033bbb4261eaec84f06c37aab70bebd
SHA256f078c6b98015ceee90fa9e9cb4c3d4d3cc512163c2304ad9e4aea35766aa163e
SHA512b8e1c82c51d81bb01e0a87fb70c29c4c61df23d46146fd8e03a36fea89d4c0d0053bf5757baeda708adb02fecc3df3dc76d12bd6f37d28a6bf3a7581fcf289cd
-
Filesize
1KB
MD5cc01c08c7c310119474d7e8ff589743f
SHA14320e3572a731b5c1262750619bcc9c54de08b19
SHA2568d93a6a6070390e547f0a16d8215b86d97265b86a183e0bf66ab4055a306cf7c
SHA51279ba34ac0c5ef4d2b5a4ade5905402e24a6006542d7b36cc14267c055e7725f06b8a2200fb716cd6f133a062a9be34c2e4a8675cb5a6c1f9f2f2125c8731fc7c
-
Filesize
7KB
MD549e689e5829c2d64d3efc865a34602d5
SHA1dbb1a30a4865a51369a3843a997eb437ad9cfcda
SHA2562f2c1bc96b99528e95bf6d328adc564ef679d0356d8f4fe4477e42446fcc7734
SHA51204ff490b8a6e355456700e07dc257a86a8bf40e2fa1f53cf8fda9889299cc17795dccffbb9b667f3e3af90b9a1e1ad88d2eea4366e31585f02a0155d5de00673
-
Filesize
42KB
MD5b975d50e6e00688b11bededc3782548b
SHA1aa0f3398d0a0b010c37fca3b542b9f1bf21a6215
SHA256a254073f1874ce9d85d639448fc6207d110d9e99463ee10af16c979beee98c0e
SHA512c4072f80849115f24da1d5dd99908bb15d0d758862295f321610c1de6ec8dca348225f757125ed47e3f0130a113584df548052ff064892963a1b119f2315c610
-
Filesize
7KB
MD56ba988044478023cc4b072e42360fb89
SHA1f52abd197c5300103d718a7afc4351d3bfa2befc
SHA256104cb6739a79fdf3fb70e408962551f8380dfcdd6106eccee9d76243133b095c
SHA51272d76077a3923455173d8bd635c8277f574a7172fec75034957433fc6e802e92a34167c96c59977382c0ba76cd3161532c8a1916dec1cd42eee785ec9932a8fd
-
Filesize
26KB
MD50cce21e7176137933293a838eaea5c45
SHA1c1cd72512c8c0e3189bf07d56d5b6a60b6161856
SHA256e10284df00568224847e83e033fdbaa9a6185a8b8c3b865c5dfcd789e55ddd17
SHA5126b5b58e7e591d373d1e5b7eaa295dddb042be45f68b60036a20727ab79ab512c0b4c2c8f3ae8801fa50b2e5c444a889f2c6ce2b1ea718847deaa180eae922db0
-
Filesize
37KB
MD558c734e56c4fa0924304befe5f996120
SHA14ca80e2b61a20a2b5a17b293d3cc04917fedc057
SHA25650e26bdebca754c6b5f3adbf536bee2c4d37ceeb3fdb2d45f53b9440d2002a2f
SHA51223bdc1ba9a700a1c01a9a28a59c6d243de032194e475a306f8089add6740af0bf60cee96ffc58ec4ca77e102f3db0c20b08baeabd175c60d695bfb0f0051bcc2
-
Filesize
263KB
MD5f8f74fb81b2c8af561c63374b99034d3
SHA132ed988341cd4a76bfbc0d4cbcbbbd2e54abaca4
SHA256d354f7d9c8c5b9220fece8734483fcc303eab59ceeadb346cb7bc117d603c768
SHA51287f98f78561739fe61cccd1cd4ade4f9d167026ac4da88c0cc2388e756f8c26f399078b5f0d529b9380950f28ca7ab841ca8f745814fe6b3b5f9d1db70c37d5e
-
Filesize
306KB
MD5a53c53073f27f4f3a92e54ec9955c13d
SHA1a37623ee9e9df70ffc1481caaf9ba6969866cdb3
SHA2567d2b44545d441e607810727a17e23edc8a187f29d526fb2def592a46dc45fd49
SHA512df92aff6af29016dcdd75a322d85be7af6466882598b0311a33fee84e635ba297a70c78b23e3abc860035b4bb7af01e498e7fdc4689b3d41f2a33da77aaa02c1
-
Filesize
408KB
MD5b2bdab4e497e689c969331336d3b79ce
SHA197db006e7ad7e0927421b80965deab01a70825ba
SHA2568b7231541601a75e1f0418a8a241b680db85d07ed4a23a5e02df2a409b3a287b
SHA5128423140eac4f72b373b4e008b55fef9a54d5f6cc2d53af933cfad231c4093a67bbd3855037459648f012a1668d7aa48c703b5c609ed8274a33784a763431368c
-
Filesize
343KB
MD51277d69ba582e10179971a639a20b810
SHA1de5d5677601a41b134489d1d7b96ae354d05a744
SHA2565be372ccc939bc9070b1a7bc6a8822700ceed592e42f6fb5abbd82e3c7221bbc
SHA512b5a9277287e4e7c1efc7563a132e85f4e4fe79c3b3978546d433f88f0c3076c2f466dbb2ce370faaaa3d9dcc3bef10f8031cdf7f82277d1d970a2cafbe9aadc5
-
Filesize
398KB
MD5473474564576bd874f27ff9fcfb9f523
SHA17750cf66683b87143176ddf4ff9a177f3fe93f04
SHA2563e777b5dc868ad7163109c86a3b863e4470ce207dda861f814e0fd99cc63f359
SHA5122bfdede799a406002ade630deb95b5ecf0095c8b48a80254ccee34bf725236bea397ac42c0b8ea7c54f651a8cec1376febce7a1071a61f376a1612f8b8a3add2
-
Filesize
115KB
MD5e68293064d280bca0f1e9f8af2501caf
SHA1f57e376149d3dde48664c07ce968993f7aab820b
SHA25645eef7a47e38ecce5ab36d5c9ad5fc1686682be365ea87eeb634e0821077ba0c
SHA51299e9083a4e0b7cc3f135b0283905dc174906e0719aa5f4e24b83be3e84b1f6d632f87f0f89015826b4a3b7e0e249dc6051b7b78f30c0909e605562c4290968ab
-
Filesize
168KB
MD53960090239c1b4044ff5f342fa1d9794
SHA1380efd0b94b962f45a5404903913195ba6058a1e
SHA25699b7b4b1fffdfa41f389e1a2c202ae390e50a658871c9feb392e431a8806e6b4
SHA5128815e47ec2b8f9e839a2f57ae3368ff4466836e42b2efdf283bfa2dd7bf2f5a5ff41df0a059b2838bdf7c26168a8a95a0e2bb879ca3552d4fb028fbc2072d58a
-
Filesize
79KB
MD5bc03d574539446dcf823622153ce6ab2
SHA10c3061c2e9eeb3768216e1eba8e3aa1665451ccd
SHA256adf2b1b32ed1936b32703105d36b9551333a90a09123a860e3b58ff823e4374c
SHA512f18683b784a6d9539b576c7fb7b5fab808e4c298ae3a61454f861008ac0f8a7b549d3d812578d5c3d5c50699d8bb21efc3b43595eadee4de74bab58d2b7336f0
-
Filesize
22KB
MD59a00d512f9e1464ad793702cf2b1eda0
SHA139a47a90cd3dd132dbab9f5052dda38dbd7c63f6
SHA25698d257f639ee9df968f77b1f66c78230d07d86e58a7ddf0d306a24af3873dc5b
SHA51218604f20351db1d418f48f2eb023be07588754b428b5d6abb0a7c40d6bf174ce7dcab2ae6e06f22585e12f1bfdb6e408b17bf20e2a7ba137620002ac04b8b4ba
-
Filesize
181KB
MD5ef3d72043408475f4b7afeae38729496
SHA1597093aaf46ae1e4ac055cf304e911778f5591d1
SHA2567d1cec4e7bcd763bcf5b4b9174bb7005afac4da855db74094b399e3a03d5f3dc
SHA5129fe3a2a3be0c5303d7de2907d18033ba1ba22f992bbbbf65d22513f820fd2ac9ff8fd32914cc455d495909635fdf71cfc3b3002c43829a8d0a66253b5049ee46
-
Filesize
80KB
MD59a09252e6dea4ff81c982515a6ea62e2
SHA1b3ec4264abc773840242a0f3313678519863b877
SHA2562e4a2eac3d20fddb611edf8bdd150481d8cdba96a6b1ac2799cec02da045266e
SHA5128b470297e84cc29cb1a865ff6e15391c996cf0d8a8975e5899d1d8d31ece80507bfa818860bd3c177d114eed3cf215ff57e89958f6893129472f7bdce2f80880
-
Filesize
68KB
MD50dfb784db7e2c058b5fbd2d0d079bde8
SHA1d7d9696377ee320c4c787f4fca26d6f96a5df591
SHA25602a12fc443da67591a8e33996ba18b5e4c7341d635331d8a6fff5071375a45de
SHA512a1c86c287d7f215f6814ed3c3410324ff9c37d031b41ec4eb083acd5c0110fc4abdec02b09396a6e1fb649befa0e4da711643b4e56db23233f527854ecc659ff
-
Filesize
83KB
MD52f949b1939c52771e0d8ef67452af304
SHA11c4eafa47a38eea2df516840204595de36bd3d10
SHA2568e3e83326b2c0af6940c29c71d5dd72d306f2a37c108bd33a7db6389675599cb
SHA5120f704fc030abc8fcc64c589a8ed7d89a204bd226c0582f0a2f5880ae39b32b3a2f95690c512bf3853765fae8aa83d2fd94d73cabaa3c3f998298c994b603d252
-
Filesize
85KB
MD5dfb18d861d1a601264192a503a36354e
SHA1bf48030bed46b4fa2004b599a674396cd38e5b5b
SHA256cf0f6524d049686a4d1687ef5bcc55062ef8d22c4c4760c87bd1109e18866f1c
SHA5123812088faae568a5a1130b500e163a7044e9d1e92e9b21e977a181294fd26b7592e7817ab028f1ccae696ea2860d9e5613845bd44edb204dbaa7ca142c30c579
-
Filesize
21KB
MD5a11068817ba83d7b8c61a5c53c5a72ab
SHA1cf4685ae095d5b1e92062c9d299cf9d250b6bab2
SHA2560ee6154256e55de7d451e729c590f5bbf65479503099c3dfeaa10deac6fe4901
SHA512a5ef2ec37eaf688c1fa926349227d25de1c5568c5630e56f8e5e3104ae6ee45275de8599d33d164cd2fc7c5b5dd853433e4228ff553d83228ae3f925446e9bae