Analysis
-
max time kernel
120s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 23:56
Static task
static1
Behavioral task
behavioral1
Sample
4a1ccbaad9869a37a032fd2aa03be4a9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4a1ccbaad9869a37a032fd2aa03be4a9.exe
Resource
win10v2004-20231215-en
General
-
Target
4a1ccbaad9869a37a032fd2aa03be4a9.exe
-
Size
606KB
-
MD5
4a1ccbaad9869a37a032fd2aa03be4a9
-
SHA1
4d61795023c9c7d4040f6e7091325868ce3bedf4
-
SHA256
ed07a209026e6ae33832e8873824dc9f1cbf06f2b7698255a0df7ee3ee356151
-
SHA512
6a6c4345e8b1b324c8abec12ee91d48a32552cdfe7ef888c4f5feef88d22931e81db550ff49ad418a273b553881c0041d8a8a23812efeeedf74432300456006b
-
SSDEEP
12288:bdEK5HO2efzbp+o/txfaWF3Z4mxxp+43xU4Ak8hTbBUWfTc:bdEnLbn1vQmXt3x7l8ZVPc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2220 4.EXE 2216 dll.exe -
Loads dropped DLL 3 IoCs
pid Process 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 2220 4.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 4a1ccbaad9869a37a032fd2aa03be4a9.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\dll.exe dll.exe File created C:\Windows\SysWOW64\dll.exe 4.EXE File opened for modification C:\Windows\SysWOW64\dll.exe 4.EXE -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2164 wrote to memory of 2220 2164 4a1ccbaad9869a37a032fd2aa03be4a9.exe 28 PID 2220 wrote to memory of 3044 2220 4.EXE 32 PID 2220 wrote to memory of 3044 2220 4.EXE 32 PID 2220 wrote to memory of 3044 2220 4.EXE 32 PID 2220 wrote to memory of 3044 2220 4.EXE 32 PID 2220 wrote to memory of 3044 2220 4.EXE 32 PID 2220 wrote to memory of 3044 2220 4.EXE 32 PID 2220 wrote to memory of 3044 2220 4.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\4a1ccbaad9869a37a032fd2aa03be4a9.exe"C:\Users\Admin\AppData\Local\Temp\4a1ccbaad9869a37a032fd2aa03be4a9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.EXE"3⤵PID:3044
-
-
-
C:\Windows\SysWOW64\dll.exeC:\Windows\SysWOW64\dll.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:2216
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
556KB
MD534d8d594c2894193c37de817c28c6d65
SHA1e149d24d005b0580631f79b7ae9defd63e1dae26
SHA2566af2050b42226ee767badb5688c439e6a838198aa4f98eaaa520fb1b8022c347
SHA512a87a7d4f404c498ab69ea5a59c50074914cd4dbeec21a97edbc98bc1344492179c22958b29b939d87d2bbf969e79ee4140e889251ef8308ba4ebc02918502a7b