Analysis
-
max time kernel
143s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 01:32
Static task
static1
Behavioral task
behavioral1
Sample
0a2948df3322cc9006498307f078b7c5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0a2948df3322cc9006498307f078b7c5.exe
Resource
win10v2004-20231215-en
General
-
Target
0a2948df3322cc9006498307f078b7c5.exe
-
Size
651KB
-
MD5
0a2948df3322cc9006498307f078b7c5
-
SHA1
0f96d0c64e0a7dafde6e31c40cdf4ee6737a7a26
-
SHA256
59e9399ea1e20c77c36897ff67d050558bd4c9b23e17a8415a17e7a45b79acbc
-
SHA512
fb7017918ca92747d65fefcfec5389fb215bc6b35c4390f6ce7130696d4e41d49b2faf8874631c1d209f14c65bb4ab9dc98667c272eb326a3ce211727b004a5c
-
SSDEEP
12288:HYv8HuTMRSI5XVzUx5CqqzmF3Z4mxxyEsy4PBNpBS2ppw0Nn:JRSqlzUamQmX+nppXNn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1364 1.exe -
Loads dropped DLL 6 IoCs
pid Process 2960 0a2948df3322cc9006498307f078b7c5.exe 2960 0a2948df3322cc9006498307f078b7c5.exe 1364 1.exe 2084 WerFault.exe 2084 WerFault.exe 2084 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 0a2948df3322cc9006498307f078b7c5.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2084 1364 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 2960 wrote to memory of 1364 2960 0a2948df3322cc9006498307f078b7c5.exe 28 PID 1364 wrote to memory of 2084 1364 1.exe 29 PID 1364 wrote to memory of 2084 1364 1.exe 29 PID 1364 wrote to memory of 2084 1364 1.exe 29 PID 1364 wrote to memory of 2084 1364 1.exe 29 PID 1364 wrote to memory of 2084 1364 1.exe 29 PID 1364 wrote to memory of 2084 1364 1.exe 29 PID 1364 wrote to memory of 2084 1364 1.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a2948df3322cc9006498307f078b7c5.exe"C:\Users\Admin\AppData\Local\Temp\0a2948df3322cc9006498307f078b7c5.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1364 -s 2803⤵
- Loads dropped DLL
- Program crash
PID:2084
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
284KB
MD58239b0cad842384dc7716213583fe1b6
SHA1d8e43d61c6ec19679580cb199a0e4e7964aef754
SHA2560d45f5b89f434172dfb94ae6075e1ec3dc6bccb801a7cb6f502c7037936f4305
SHA512add8aead24581f568f7b95f2db79eb5587b9946cd93603116c3c7b889470d58935e6b19d0d339ab50237b6dcb5a43b4d6486c6cf5b30cf6d9c198a3c53172089