Overview
overview
7Static
static
1HOTFIX/KB832483.exe
windows7-x64
7HOTFIX/KB832483.exe
windows10-2004-x64
7HOTFIX/KB833989.exe
windows7-x64
1HOTFIX/KB833989.exe
windows10-2004-x64
1HOTFIX/KB842773.exe
windows7-x64
7HOTFIX/KB842773.exe
windows10-2004-x64
7HOTFIX/KB890046.exe
windows7-x64
7HOTFIX/KB890046.exe
windows10-2004-x64
7SETUP(IE6+DX7).cmd
windows7-x64
1SETUP(IE6+DX7).cmd
windows10-2004-x64
1SETUP(IE6+...9).cmd
windows7-x64
1SETUP(IE6+...9).cmd
windows10-2004-x64
1Analysis
-
max time kernel
122s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 22:21
Static task
static1
Behavioral task
behavioral1
Sample
HOTFIX/KB832483.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
HOTFIX/KB832483.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
HOTFIX/KB833989.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
HOTFIX/KB833989.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
HOTFIX/KB842773.exe
Resource
win7-20231215-en
Behavioral task
behavioral6
Sample
HOTFIX/KB842773.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
HOTFIX/KB890046.exe
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
HOTFIX/KB890046.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
SETUP(IE6+DX7).cmd
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
SETUP(IE6+DX7).cmd
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
SETUP(IE6+DX9+WMP9).cmd
Resource
win7-20231129-en
Behavioral task
behavioral12
Sample
SETUP(IE6+DX9+WMP9).cmd
Resource
win10v2004-20231215-en
General
-
Target
HOTFIX/KB832483.exe
-
Size
2.0MB
-
MD5
b4060134ceff0f35fac0ef0968558950
-
SHA1
6f348d3e603d0aa2d84429c69be1698a0d2a6b7b
-
SHA256
ae810df56535e49c3716df0ac7f8b303e9810b6b90802f6732422e724fa69a23
-
SHA512
4a9d66e26a4330b0c460d78fa90986837a5f228f9861f398c691c3abdc5806420465cd00b6e0ec652793c77bcc552db7178f19f6e2c71b783768536798abcead
-
SSDEEP
49152:kJj4LNeJQlHrkUXC1m+9d+7rikF31/KcvpjJ0TOSFNesTA+W73v4M:SUoWL1Spd+39sTRNf1S4M
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2288 dahotfix.exe -
Loads dropped DLL 4 IoCs
pid Process 320 KB832483.exe 2288 dahotfix.exe 2288 dahotfix.exe 2288 dahotfix.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" KB832483.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\dahotfix.log dahotfix.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 320 wrote to memory of 2288 320 KB832483.exe 28 PID 320 wrote to memory of 2288 320 KB832483.exe 28 PID 320 wrote to memory of 2288 320 KB832483.exe 28 PID 320 wrote to memory of 2288 320 KB832483.exe 28 PID 320 wrote to memory of 2288 320 KB832483.exe 28 PID 320 wrote to memory of 2288 320 KB832483.exe 28 PID 320 wrote to memory of 2288 320 KB832483.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\HOTFIX\KB832483.exe"C:\Users\Admin\AppData\Local\Temp\HOTFIX\KB832483.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\dahotfix.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
PID:2288
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
24KB
MD5ffcabe82612af7554019d409bf6e6e0e
SHA1aa757a5488e16d7c85911b54e41c4513708a8607
SHA2569d41b83ce2c47d403ac495456005371dfe9aeced7bfca819881c82041a1f906b
SHA51292b9963ddeb6a29ddffefec03916733f8da99a4de00a3a18055dbadbfa192794c9e5336398af8bc602590e0399a54b655c1257aea2551d2394ade2c861799f0f
-
Filesize
24KB
MD5a1825b549b53699b5f79d6304a7b1cec
SHA1ad440122e403969305f9bf45b4cb8058b4a83ed2
SHA25606636809ed6915b791ad9ef2988deaddcca3a01ce7e87a0f6034bd8377f54953
SHA51273dd397a688c93b453b7c8ec68f2da2b997e6ea4bf64838d05fcecac7eb7d3f9ee19afcd7295330dbe489e4de247099182a9cdf4d96d08d9dfee2a80299f270f
-
Filesize
512KB
MD5b0f2b24c1c1e0d0a4bfc78006981606f
SHA1a6f649c5308514d827206fae386a17a08dd8c592
SHA256f028acac40d8d00b710287a8297eeaa6cf97c11dd7d011531a6ba370223f70c0
SHA5128aefed3a57b06cfbe96e14f3589077487897c11407ad60ce59dcf35f3a84ba656d800a15f4c5af6d60e2e15cab5f06e55b0fe64e0c237843ec25931f6798fa02
-
Filesize
119KB
MD56da333113835598bd7e8cacbdf06dac5
SHA14517f066f8cf077f1a5726710ebb194e31b2292e
SHA256c9a931fa58c8a7557ad8495147977e120799b287143144791e9c8b6d611e70a4
SHA5124c5f3c0a621b1b4e9076a93f7d969288010f701dd34e2d5c47de2c7827cae7f1474c7a680ee82dad676cb9198dec5dd58ed6bee05d40ed56ec516f2338a13387