Analysis
-
max time kernel
140s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01/02/2024, 18:11
Static task
static1
Behavioral task
behavioral1
Sample
878bf88402de667eabaa0dee94268469.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
878bf88402de667eabaa0dee94268469.exe
Resource
win10v2004-20231222-en
General
-
Target
878bf88402de667eabaa0dee94268469.exe
-
Size
1.1MB
-
MD5
878bf88402de667eabaa0dee94268469
-
SHA1
733db7eebd84724eeb91effeaf0f2429b1a1f70d
-
SHA256
45c09a7e363ccce38df3b025bd337136eea1d4f7538b5deac26c569b9aa7b9f5
-
SHA512
6cd23b610f950849fe8244831be0b423956739ca59062a5647e4caa55b6dba52fd95b6e2b2a3a5b0b74b9766b91655edf38ddfca21c7ce90aaca563e09050dbe
-
SSDEEP
24576:qZEnv0hGq5WerQ/uNYwFGPbWxfYX4P33TCgT1hvLCH:0AchGq3rQ/uOwFGPbWxfzPV1hjU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2996 FACEBO~1.EXE -
Loads dropped DLL 1 IoCs
pid Process 2928 878bf88402de667eabaa0dee94268469.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 878bf88402de667eabaa0dee94268469.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2996 2928 878bf88402de667eabaa0dee94268469.exe 28 PID 2928 wrote to memory of 2996 2928 878bf88402de667eabaa0dee94268469.exe 28 PID 2928 wrote to memory of 2996 2928 878bf88402de667eabaa0dee94268469.exe 28 PID 2928 wrote to memory of 2996 2928 878bf88402de667eabaa0dee94268469.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\878bf88402de667eabaa0dee94268469.exe"C:\Users\Admin\AppData\Local\Temp\878bf88402de667eabaa0dee94268469.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FACEBO~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\FACEBO~1.EXE2⤵
- Executes dropped EXE
PID:2996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.3MB
MD575211415cd0ac077b248ed0c2751d178
SHA199ac1bf517000f0d168aaeba70cce653877199bc
SHA25625b78be60510b88a38c3ab51ebddb47851cee9a565e768316f1c78db7100c9f5
SHA5129110add43200a1b661b318d2ac115463e01439b9ca5a40ff8e7956039ab89885f404ee52b9ae7b8d3e27e069cb4475389f774cda11346faab7966b172ce84f31