Analysis
-
max time kernel
195s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:29
Static task
static1
Behavioral task
behavioral1
Sample
05a132213c55150bd7eb19b12a9ec615.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
05a132213c55150bd7eb19b12a9ec615.exe
Resource
win10v2004-20231215-en
General
-
Target
05a132213c55150bd7eb19b12a9ec615.exe
-
Size
1.0MB
-
MD5
05a132213c55150bd7eb19b12a9ec615
-
SHA1
77afc013c1d70ab190cb82bf473e00f9e6ea3bbe
-
SHA256
72150744ee85074592c99946fd4577baee1795e74f5e1cc4afd03d9a9dd50ad8
-
SHA512
b36a7833a0124df7b1601c834247a2a94e8f91916b4a452f3c67e07431d08b4b9398a7cce6dd96908dd707c0c29df5211b5b3391b1da60e1a14cb500a209c162
-
SSDEEP
24576:j41+PU/2ueS8I+IGGyrOjPzLZ+9O1kWQmXKVTzLH:k+PU/2uNn+IGVcHRavmaVH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 564 1.exe 2624 temp.exe -
Loads dropped DLL 7 IoCs
pid Process 2848 05a132213c55150bd7eb19b12a9ec615.exe 2848 05a132213c55150bd7eb19b12a9ec615.exe 564 1.exe 564 1.exe 2880 WerFault.exe 2880 WerFault.exe 2880 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 05a132213c55150bd7eb19b12a9ec615.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2880 2624 WerFault.exe 30 -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2848 wrote to memory of 564 2848 05a132213c55150bd7eb19b12a9ec615.exe 29 PID 2848 wrote to memory of 564 2848 05a132213c55150bd7eb19b12a9ec615.exe 29 PID 2848 wrote to memory of 564 2848 05a132213c55150bd7eb19b12a9ec615.exe 29 PID 2848 wrote to memory of 564 2848 05a132213c55150bd7eb19b12a9ec615.exe 29 PID 564 wrote to memory of 2624 564 1.exe 30 PID 564 wrote to memory of 2624 564 1.exe 30 PID 564 wrote to memory of 2624 564 1.exe 30 PID 564 wrote to memory of 2624 564 1.exe 30 PID 2624 wrote to memory of 2880 2624 temp.exe 31 PID 2624 wrote to memory of 2880 2624 temp.exe 31 PID 2624 wrote to memory of 2880 2624 temp.exe 31 PID 2624 wrote to memory of 2880 2624 temp.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\05a132213c55150bd7eb19b12a9ec615.exe"C:\Users\Admin\AppData\Local\Temp\05a132213c55150bd7eb19b12a9ec615.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:564 -
C:\Users\Admin\AppData\Local\Temp\temp.exe"C:\Users\Admin\AppData\Local\Temp\temp.exe"3⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 884⤵
- Loads dropped DLL
- Program crash
PID:2880
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
852KB
MD51b97159551ad8e0795b6eae7301f8733
SHA12fc548d649d5bc714fa28c2752953a67ecfc6ae8
SHA256eb07a17457e6f84510d9b14dc52d618c9c182c948605b9fdb5a0012959964ab9
SHA5129a80ed86fea0a0894ea833c3aaa4d3fff39fd8ca08c2df50d6545a14606214914faf276692967b346aad5fca2d3cdffd9752bc98a5f3a687bc7a77d80f2ce8f8
-
Filesize
472KB
MD5ee751647963195330d7216a3be8d7854
SHA132b456d92393db4d095ff7d6ec063bb4d93dbf08
SHA256d7899b0ef7cff691ec9f14adddab808ad6f52fbbd9548656abf7f6d38bbc9c6a
SHA5120bac2e3c7e157a4ce03bb147273654819c669e8c17648285237ee8ee4a24a0393c999a2c035bfd3189850ec05022867e9fbbd0c7dcba19bf670f8eb274a43838