Analysis
-
max time kernel
117s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-01-2024 04:20
Static task
static1
Behavioral task
behavioral1
Sample
5a438591b5746bfdc8bd6383d75d0db8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5a438591b5746bfdc8bd6383d75d0db8.exe
Resource
win10v2004-20231222-en
General
-
Target
5a438591b5746bfdc8bd6383d75d0db8.exe
-
Size
896KB
-
MD5
5a438591b5746bfdc8bd6383d75d0db8
-
SHA1
3650bd35145ac6b42a126177885f51a7687b57fc
-
SHA256
16cd7a02ee8ff9c21989477b31a55e6fb4bf406142bc164f9e0556d4f57c8934
-
SHA512
7d8336870f012c77ca2b75ad682a8c09cc5442c40d056e969e9d8d3bcb04461ff613f89e164f4288631268d7be1c8792bfe1160a9291bdef6e36eaf35f6cb4cc
-
SSDEEP
12288:yYNfqsvkQsFvtxcCZeGsU71YmV1sl5h3/vKHUqXV7S+4dkJ0utF3Z4mxxTUn00yV:zbvs/x/AAHqlDxqXI60utQmXT2dy5QkT
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000f000000016d52-16.dat aspack_v212_v242 behavioral1/files/0x000f000000016d52-20.dat aspack_v212_v242 behavioral1/files/0x000f000000016d52-18.dat aspack_v212_v242 behavioral1/files/0x000f000000016d52-22.dat aspack_v212_v242 -
Executes dropped EXE 1 IoCs
pid Process 2804 HKFXOK.exe -
Loads dropped DLL 2 IoCs
pid Process 1956 5a438591b5746bfdc8bd6383d75d0db8.exe 1956 5a438591b5746bfdc8bd6383d75d0db8.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 5a438591b5746bfdc8bd6383d75d0db8.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1956 wrote to memory of 2804 1956 5a438591b5746bfdc8bd6383d75d0db8.exe 28 PID 1956 wrote to memory of 2804 1956 5a438591b5746bfdc8bd6383d75d0db8.exe 28 PID 1956 wrote to memory of 2804 1956 5a438591b5746bfdc8bd6383d75d0db8.exe 28 PID 1956 wrote to memory of 2804 1956 5a438591b5746bfdc8bd6383d75d0db8.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a438591b5746bfdc8bd6383d75d0db8.exe"C:\Users\Admin\AppData\Local\Temp\5a438591b5746bfdc8bd6383d75d0db8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HKFXOK.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\HKFXOK.exe2⤵
- Executes dropped EXE
PID:2804
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
306KB
MD5364a792134ac05ffbe99e19df195f0a2
SHA10bee9b3e8215aff8a82d8ae7b8b886466c96f444
SHA25672f76ae897c118ddad93a3a1b3b6324ac1086879342c8082ad2e67757adc5546
SHA512517c4f5ddd9f2bd2801b3b24f4db3b2d60e21fff398dc57b3e34ff0c1e9c03364aeda9c081aa238ffea7765b84fc1f1126f364be94d50b3b9e862934976d0ebe
-
Filesize
244KB
MD585353f489321cda6340c79ec5cf8d047
SHA1c037f6e60c0ba746a5f28b26d452a395e12116e4
SHA25605b7a20e0ca9088f4e4fe7d8768ad7e6de95c4c5cd8c3106744739a12b16ef8e
SHA512f7820eca857270fef560a9b5557922a481cddb98b7352aa06097802117ad83272d12fc93fec1a11bbf0859425e2ca9ea0e59e84d6c86d4e6e44fc2dd7e59ff62
-
Filesize
198KB
MD5ddcc1d747154525d842b182737d863f1
SHA1fe8db9bf9a486cd86828ea4345daf597516a949a
SHA256e5c4d500ba531c50387fb98805e49debe8b0cef15fd21f6b06a811a7794dc33b
SHA512cd913ae456197f620d7d7f6be489507bfeed5b7e3b144c9da16066551fbf91dbe4ae269235270f636579806a7a19efae5e6ae3d03183fc6d80b5dc93687cb053
-
Filesize
460KB
MD52aacf34b9f0a04b084aa5ce32e2f4436
SHA1c2aa9beded111b32f306fa6608dfd50aac1ca0e0
SHA2562ef2bb8e09e45fefca3c10313fcdfade01ce92d35b18dd7678d67408e8c53c7f
SHA512167dcdb2665502ae01d388f09cefd45d9d1fb3916226dfd3088a2224e7a168d69e4b3b376cbcf79a95ed49fda48108bb0b24f97837b77742c22bdfb354002be1