Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
13/01/2024, 23:06
Static task
static1
Behavioral task
behavioral1
Sample
59a524c2928595e3e7c8e45ba5f8877d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
59a524c2928595e3e7c8e45ba5f8877d.exe
Resource
win10v2004-20231215-en
General
-
Target
59a524c2928595e3e7c8e45ba5f8877d.exe
-
Size
304KB
-
MD5
59a524c2928595e3e7c8e45ba5f8877d
-
SHA1
f6750abb1d9b68d8244f9a6bad6754f0cf55a029
-
SHA256
77e6fa761983370d075f8cbdaa22280449e732490b7b6841d116edf6037aeec6
-
SHA512
0efbfc7ef1c873c3b733a5defd9ca5e9695cf2d5ef8cfae7270704268a36c4d781c9f5d37c4ea3c27dbe80525ab915bf8344390e3b84a23cfec71fb997aebb16
-
SSDEEP
6144:C/0uoLcNe1F6DizTa9uZMlIKGs7LTqy3etzsvDH/xe:CJix1k2q9uZMcsmyxDHZe
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4672 10054_~1.EXE 1280 ePSXe.exe -
resource yara_rule behavioral2/files/0x0010000000023124-19.dat upx behavioral2/memory/1280-20-0x0000000000400000-0x00000000008E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 59a524c2928595e3e7c8e45ba5f8877d.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppModel\Deployment\Package\*\S-1-5-21-1497073144-2389943819-3385106915-1000\{A5E1D70E-3CA0-44A4-9ED8-BFA2BE1E0C46} svchost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4680 OpenWith.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3212 wrote to memory of 4672 3212 59a524c2928595e3e7c8e45ba5f8877d.exe 89 PID 3212 wrote to memory of 4672 3212 59a524c2928595e3e7c8e45ba5f8877d.exe 89 PID 3212 wrote to memory of 4672 3212 59a524c2928595e3e7c8e45ba5f8877d.exe 89 PID 3212 wrote to memory of 1280 3212 59a524c2928595e3e7c8e45ba5f8877d.exe 92 PID 3212 wrote to memory of 1280 3212 59a524c2928595e3e7c8e45ba5f8877d.exe 92 PID 3212 wrote to memory of 1280 3212 59a524c2928595e3e7c8e45ba5f8877d.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\59a524c2928595e3e7c8e45ba5f8877d.exe"C:\Users\Admin\AppData\Local\Temp\59a524c2928595e3e7c8e45ba5f8877d.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\10054_~1.EXE2⤵
- Executes dropped EXE
PID:4672
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ePSXe.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\ePSXe.exe2⤵
- Executes dropped EXE
PID:1280
-
-
C:\Windows\system32\OpenWith.exeC:\Windows\system32\OpenWith.exe -Embedding1⤵
- Suspicious use of SetWindowsHookEx
PID:4680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k BcastDVRUserService -s BcastDVRUserService1⤵
- Checks processor information in registry
- Modifies registry class
PID:4544
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
89KB
MD525fc448ee4f93e6f98458fd631e30c6e
SHA14512de71991eda40509dae5afcc6a80fea9ab631
SHA256b88e4865cc23836275ce6efc2c9f1b2c42ea0c8f34ad90913cdca7f4b48a678f
SHA512654f880fa4f21d22cae423299886ac1cb0d8b380e60dfe1b28a787a838919448411c4a713296aeca11e17e5cc114518ec448f7a3047f6f8f17b8740a5292d9b8
-
Filesize
158KB
MD5861fe2f10e899afadd5a806a80611c2b
SHA15b374e343858e2061eb909036f13578ee321ef9c
SHA256f2f635dfb6c97aa02a653c435726c908860163e48a834ff6606f5450686ffe18
SHA5122065512ee9c3b2644a55647b22bff6b3bcb8cdd0dc9d84ad052f57d39495fc61fc64c023901b09f1ab0222b91291730fc7f0cf25bfcaca1a759865ea9e2265b5