Analysis
-
max time kernel
161s -
max time network
132s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 01:44
Static task
static1
Behavioral task
behavioral1
Sample
9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe
Resource
win10v2004-20231215-en
General
-
Target
9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe
-
Size
3.6MB
-
MD5
72b5dabb54b8e5670356196f7acb1451
-
SHA1
b276e1f3adef604c3c3a3ef81b85cc1eef5eda8e
-
SHA256
9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7
-
SHA512
66e769bdf04a92a23c616184b5f5fe5bbb060f9749a4e62d571835286fa5d7d1025d6be0be4387f2d3e2deca44155a8dd5e814ba8d20ab55985beba7fa509423
-
SSDEEP
98304:TWMpvfckkBJM/tBFENRK+pvpIpW1afQtU1/a:TWMpvfpq2BELKmvYo
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3664 install.exe -
Loads dropped DLL 2 IoCs
pid Process 3664 install.exe 3664 install.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2364 wrote to memory of 3664 2364 9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe 91 PID 2364 wrote to memory of 3664 2364 9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe 91 PID 2364 wrote to memory of 3664 2364 9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe"C:\Users\Admin\AppData\Local\Temp\9ca38a30ab317120dd0f0d2c6c5a1edd04259cf63269c7121707c9bc70f239d7.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\install.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:3664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
14KB
MD50bf757a9b434139aeeb7efe413b0e60e
SHA1fb70177080ff59dd1946107b632cd848d1761130
SHA256cae6d6b3ce31613a6578471552933f4b8b7cef223f7c2b98efcb4bee97b34cfa
SHA51217830dd34b1a4425492c3a93d4e2b852cfc5b6ad5b51692201471b7e3bc9e3e945a77364f93fc0b6abb5767fa2884b3461e08cb05d5cd23ae6ed300ea1d4d11d
-
Filesize
1KB
MD592a9351b7484149869a777d840b3d828
SHA176272f9700ddaae97dd2001cc17566d1464e5366
SHA256c23095bfba5d9a895b484f4923c134335c03345cd24709cc7d269ca45e51f2a0
SHA512654945e2a4e2a107c94274fe7811ebb23f2389c8c248cd980ff446f60d686768a2e2c876609bb23130072102547df5c75d039809e6149d5c99409d1d19d0d1bc
-
Filesize
177KB
MD5c952c0e7067cf565f625a5c0f5cbbcd5
SHA13feb8e8a88a0999d2b9531a31d67ebb23802448c
SHA256463ac390c53885ca5123d272a90a64ae361bec00fd997d2cb578170ea9e8f4e3
SHA512d6cbdc5ecf8692d0b352a15d1edb848fda3b3882e7f60d76b7cec4cb2906dc65c62d1c2c090e186aacb79210d5f823e3e1c775dfe65eefa5d5e28e5d4ab7fd02
-
Filesize
382KB
MD5164e781f5ac884f6b1be24ba2ed64489
SHA13af275164f837d6e12e0588fea34ef528afa20bd
SHA256a55cf1d3ea8afbfc6c46a470699ee899cf328e7d00bef2fb2168ef2ce4d54677
SHA5128916c31bb62bde3dfed52b10b6357e6372c2f7cb502134a16fb24c1cf469aa5628db05ccb4117d385e24e95e91a871ffefb4db5e53d830524cde898e7bae2aa0
-
Filesize
4KB
MD5d04d2351f1d4428584f14799117878cd
SHA10ce431f96a13305884739567d49792bf9a5ab4f4
SHA256914b8dc9cc5fc6782cbac33d2825df9a749fb9ae1ec7fd6f14989c3b3f9d22fb
SHA5128d2f2a09e724f027a877d19025f1ab4449c2b41496c573881d321de68c59986b32f6a2911c1be1531d0a3fef31598ef436d25dff4a9f6ed15230f7e70f133def
-
Filesize
79KB
MD5106aae09947bac0b6ee222a4406a39e1
SHA1c0d69473c175b30bf49634b3af1cfafe48a088fd
SHA2568cf095078bcac57a880b19d6211d075e081fefd4de679c3433a17ed8a29aef3b
SHA512aa37be1745aca1e94a3c738d46f80b236c68053f3ae4b73f210075ce059840b81cfc8e1265f67d93762f0d8270cf2fdc3bcf7ab2ffb782fb29a1e761c2f26ec0
-
Filesize
41KB
MD51197c3f91aecc561456bcf8ff065f823
SHA14bc4478cace769c17d64dfcc32f70513f7c0089d
SHA256066a7de018eff3c09494b022f9b74a2bfe44bc0128bff4515cfcf1aef8297804
SHA512a6f36e19af6606890aead62a7b5758dad0095c32d8cf1cbe2b4a1365ead53fe81c3f894ed4b26be035a613df69591c375915a4ee9cbe35e2ffa94f3130eea1e5
-
Filesize
5KB
MD506fba95313f26e300917c6cea4480890
SHA131beee44776f114078fc403e405eaa5936c4bc3b
SHA256594884a8006e24ad5b1578cd7c75aca21171bb079ebdc4f6518905bcf2237ba1
SHA5127dca0f1ab5d3fd1ac8755142a7ca4d085bb0c2f12a7272e56159dadfa22da79ec8261815be71b9f5e7c32f6e8121ecb2443060f7db76feaf01eb193200e67dfd
-
Filesize
41KB
MD5b4fac2c09096b4875e2617a1efd2a918
SHA109d03358a3c15ca85bd58fdb915a2ae3bb8e723d
SHA256c6d87e314fa5246941891889afbb0fbd9976978e993f367e61daab42018a7f57
SHA512727deedc706fc252cffd3784d7f9b02e3f4a5b80b98bfad85450307ee517776ac1468f14f7bcad9d35543e3e30f26bf0d252471afba34cc1e88970dfd3ad0400