Analysis
-
max time kernel
133s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:46
Static task
static1
Behavioral task
behavioral1
Sample
060aed3596f437c7e58b822cd5394233.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
060aed3596f437c7e58b822cd5394233.exe
Resource
win10v2004-20231215-en
General
-
Target
060aed3596f437c7e58b822cd5394233.exe
-
Size
357KB
-
MD5
060aed3596f437c7e58b822cd5394233
-
SHA1
fa55463767cfa6cff6fa123f5a8a74a66c94324a
-
SHA256
97581894ac55f149b94de29fe27c632a4173c77c049cc46ce48750c06f20d81d
-
SHA512
29a2f8f3fcafe26efbc2e8298b94195d6d60b20536e73ac61080817b980e512daa992d55e0d83eaf698f8017046b2431be6281309da328254f219dd5c2841cf1
-
SSDEEP
6144:4IpbRF2idZecnl20lHRxp3g5rI0EnezGM7HSJkYAmhd5Ugh7TgdfB:TpbrF3Z4mxxknUqGGGkYThd5UcOp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2816 4.exe 1288 4.exe -
Loads dropped DLL 2 IoCs
pid Process 1444 060aed3596f437c7e58b822cd5394233.exe 1444 060aed3596f437c7e58b822cd5394233.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 060aed3596f437c7e58b822cd5394233.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\4.exe 4.exe File opened for modification C:\Windows\SysWOW64\4.exe 4.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2816 4.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1444 wrote to memory of 2816 1444 060aed3596f437c7e58b822cd5394233.exe 28 PID 1444 wrote to memory of 2816 1444 060aed3596f437c7e58b822cd5394233.exe 28 PID 1444 wrote to memory of 2816 1444 060aed3596f437c7e58b822cd5394233.exe 28 PID 1444 wrote to memory of 2816 1444 060aed3596f437c7e58b822cd5394233.exe 28 PID 2816 wrote to memory of 2680 2816 4.exe 30 PID 2816 wrote to memory of 2680 2816 4.exe 30 PID 2816 wrote to memory of 2680 2816 4.exe 30 PID 2816 wrote to memory of 2680 2816 4.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\060aed3596f437c7e58b822cd5394233.exe"C:\Users\Admin\AppData\Local\Temp\060aed3596f437c7e58b822cd5394233.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe > nul3⤵PID:2680
-
-
-
C:\Windows\SysWOW64\4.exeC:\Windows\SysWOW64\4.exe1⤵
- Executes dropped EXE
PID:1288
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5a53105885bfbb992e3762a16cbbf7464
SHA1981c848789e283a71f77ce76a8c09c5d40bdf62e
SHA2562ae334d84d892b4a69d25339f590de3d6a3ffd07f092e49bca463a712ae67656
SHA512675e317d8c18ceba7a939342ed99b9a5cfaf689cd8b7d9ff807f8028421818d3ce2ab805aaa0954e19254dbbd5e2fdfedeeb7297fc2e50cbd54b51ae27a72cb9