Analysis
-
max time kernel
164s -
max time network
175s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
06/01/2024, 16:42
Static task
static1
Behavioral task
behavioral1
Sample
46b65177dc987f6c15bf187de54feafd.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
46b65177dc987f6c15bf187de54feafd.exe
Resource
win10v2004-20231215-en
General
-
Target
46b65177dc987f6c15bf187de54feafd.exe
-
Size
430KB
-
MD5
46b65177dc987f6c15bf187de54feafd
-
SHA1
9728150c77afbcc16891c5f46a1363980cc109f8
-
SHA256
7bd347cc23ad53bee61e05d24bf364ce3bdd4a3ee285559caf3bd6fb903b4f09
-
SHA512
f8b1c5f4f40053687ce4b627cb5103c3e1611eec435f0fc661d8ecb24d54291739d1b20d5ed13f049b601fae73fb1c9cac3a05ef71505ded6fc66a1a6e37210d
-
SSDEEP
6144:HtS8QOd4NhvkAF2idZecnl20lHRxp3gmo+JR9MocBToNsKDvN1YqmtHo:HNXy3kwF3Z4mxxbZRKowmNvN
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5008 2.exe 4888 MM.exe -
Loads dropped DLL 2 IoCs
pid Process 4888 MM.exe 4888 MM.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 46b65177dc987f6c15bf187de54feafd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup1 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP001.TMP\\\"" 2.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\SysYH.bak MM.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4888 MM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2188 wrote to memory of 5008 2188 46b65177dc987f6c15bf187de54feafd.exe 96 PID 2188 wrote to memory of 5008 2188 46b65177dc987f6c15bf187de54feafd.exe 96 PID 2188 wrote to memory of 5008 2188 46b65177dc987f6c15bf187de54feafd.exe 96 PID 5008 wrote to memory of 4888 5008 2.exe 97 PID 5008 wrote to memory of 4888 5008 2.exe 97 PID 5008 wrote to memory of 4888 5008 2.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\46b65177dc987f6c15bf187de54feafd.exe"C:\Users\Admin\AppData\Local\Temp\46b65177dc987f6c15bf187de54feafd.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\2.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5008 -
C:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MM.exeC:\Users\Admin\AppData\Local\Temp\IXP001.TMP\MM.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
PID:4888
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
75KB
MD5688103300bf9b826e70260513d75a3fb
SHA103c7a2f1a1184ec50aeb6a313fd310e2f8c30298
SHA256c89836da7970eccf8e7ecd9835fbb6129ce1dd18322d9220eff73db962e78509
SHA512ac2884076dbc453fc7e99d383a7c0b6a6ec279530b025d856e7ab9392ce72471384834808d578edf571c5b788a02b4b1736b4977372b7c4c80a88ec93001d4fe
-
Filesize
40KB
MD59a9eb426de5baae6b98fc87e9d0c252c
SHA10139e26e86a122bdf8fdb16c0e42250198897373
SHA256f3b43ada70b0252f356e2bdce3c33d276c4b0314d77a4914a9f855f12873f19d
SHA5121327edcba7731a0f700d4ca53d71a737ce6f9e27c2866ea63a5c718a111be51382c9f48686d254559397eaec267486b58774a809ad905ac11ecd9abc9c2ba2e5
-
Filesize
237KB
MD5f1bdf22fed0b11172faa0d32afe4d74b
SHA15cc9ea61fb35ef2334256836e6e0f885499beedf
SHA256e64633e5e0786fb561b36c1c82b302d92ab067b9abfcd1c99ccded3d2925b899
SHA512465938f8a622232ebf9a491304b6cc8ebe56c1f451cb301f29b4534a6f445015112c74ffc65c7e8331e22da5ad318eb07453195be66cda5bf27f168df915e59f