Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
18-01-2024 18:25
Static task
static1
Behavioral task
behavioral1
Sample
65b88489f79f8f3960141d3df37fbd4f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
65b88489f79f8f3960141d3df37fbd4f.exe
Resource
win10v2004-20231222-en
General
-
Target
65b88489f79f8f3960141d3df37fbd4f.exe
-
Size
340KB
-
MD5
65b88489f79f8f3960141d3df37fbd4f
-
SHA1
9f19352f8c9d1993e19c3a473eb35b4fa5804657
-
SHA256
7b844252cda7d56d4f23f2e33d31907abf3f1605506153b0d40176553f6ed1de
-
SHA512
6e1f1a2abbfe84712bc952b37b806db334809c1a1b17f47bb2681e3e58402cc79f8889a8ce376ebda6247eb077aa2ecc091b56ea608e367d1919d93624ed909a
-
SSDEEP
6144:8h3VcYa95lebnspAs6xUtnlx4atDaOq5TOtsp0yN90PEk:0Rk5wIp4zatDaOGSXy90b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2692 server.exe -
Loads dropped DLL 3 IoCs
pid Process 2780 65b88489f79f8f3960141d3df37fbd4f.exe 2780 65b88489f79f8f3960141d3df37fbd4f.exe 2692 server.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 65b88489f79f8f3960141d3df37fbd4f.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2692 server.exe 2692 server.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2780 wrote to memory of 2692 2780 65b88489f79f8f3960141d3df37fbd4f.exe 28 PID 2692 wrote to memory of 1384 2692 server.exe 18 PID 2692 wrote to memory of 1384 2692 server.exe 18 PID 2692 wrote to memory of 1384 2692 server.exe 18 PID 2692 wrote to memory of 1384 2692 server.exe 18 PID 2692 wrote to memory of 1384 2692 server.exe 18 PID 2692 wrote to memory of 1384 2692 server.exe 18
Processes
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1384
-
C:\Users\Admin\AppData\Local\Temp\65b88489f79f8f3960141d3df37fbd4f.exe"C:\Users\Admin\AppData\Local\Temp\65b88489f79f8f3960141d3df37fbd4f.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\server.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
26KB
MD5ae55a74b368a620deeafd702bc407e99
SHA1d5c0047a945559b24148c4c1a462f601b21b07cd
SHA25674919c9025ddbff00f5a3d6ae8ce9f3d5e8660472ae56614f3dcfcb5f0661d03
SHA512145bda3066bed2f9418cbefa7acbfd4e04056cb5138f55f5cf9b6a6bd43c665cf4fc8fbdad0e64fbbae8e906d47d5d176678108b61994567e728a57f223d387a