Analysis
-
max time kernel
147s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 08:14
Static task
static1
Behavioral task
behavioral1
Sample
AdwareAway.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
AdwareAway.exe
Resource
win10v2004-20231222-en
Behavioral task
behavioral3
Sample
安装说明.url
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
安装说明.url
Resource
win10v2004-20231215-en
General
-
Target
AdwareAway.exe
-
Size
2.2MB
-
MD5
ef792144b76a560c7aae36266fbb12eb
-
SHA1
1337333367a107330f827541a51c1cb88fba3d33
-
SHA256
dd2710b05a127c8b1e086c7cea3127124c42750d2ceda145e98024ca75f9bb95
-
SHA512
efea39c56bbb8b3217ed48b7a65e2e7d9eae0e6961f015f452addee439691a9822c0a19c10b3cec7c8c1df1371189c9bf7e1fe271772997f1cf78df2baf922a5
-
SSDEEP
49152:l3gjidnllAOa9Ra/XGZC2jscGJJSZ1WyDD0PUyPR4GAB3BI3:lEcnDEvU23scUSZ1WJvPRuBR8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 484 INS5ACD.tmp -
Loads dropped DLL 4 IoCs
pid Process 2408 AdwareAway.exe 2408 AdwareAway.exe 484 INS5ACD.tmp 484 INS5ACD.tmp -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28 PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28 PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28 PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28 PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28 PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28 PID 2408 wrote to memory of 484 2408 AdwareAway.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe"C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\INS5ACD.tmpC:\Users\Admin\AppData\Local\Temp\INS5ACD.tmp /SL3 $500F4 C:\Users\Admin\AppData\Local\Temp\AdwareAway.exe 2340176 2343191 609282⤵
- Executes dropped EXE
- Loads dropped DLL
PID:484
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
256KB
MD5a9d6a46adcee0c06bed665c6dfec3998
SHA1943c112f950ff35c93eeb60108c6f3e5d74da656
SHA256eb4017a1b20ba1384bd1bb736f873caa735ade3eec14a2252c31f73ed6d40f6a
SHA512a0cfb129b36363449c6fd191269b5d5d9f0d44fd3921ec60f612c3c647052cc73b6d9ba5a9c23a3f11e07192b2a43f339338908c669056b27b8052e47a8ff667
-
Filesize
229KB
MD54a658ae9c7e7d915aec4a34a416027b9
SHA1d0ec54bab890d5cb5a1533c711fb8a5c09f9b544
SHA256cee9da07b3291dd1e069874ebb235eead6bc3dc849300cb376cc002e04540b2b
SHA512db3dda93143f4cce654e9ce5e6904a23c9a149b193dfff39730b04eb94999ad92cff9d02b63bdd773a50a902674edd13e8930e2ec3d309151b627408d3d63654
-
Filesize
345KB
MD59cf2de1f66ed99f2c3b9e3af3951d9bc
SHA18d4d22d010c9b9243381507d73724bd9d134b012
SHA2563727307cf3c68bcece871a4af929b4b3cdc8007d5ee7a37c30ce66f5731833c7
SHA5122b239859a511bbc57272720ff76a6130e1392cf4e544014250695d137dfe28e750f6181f1093c47aefd06f76fb5d2d9ac3ca5cb1ad37f5cee3f44bfddb423803
-
Filesize
22KB
MD5153241df0b44d47db2aa2ee755ea62c9
SHA14a6beaf3cf09bbcc6acb2382dff47c034c27fafc
SHA256fd3f175e7d31a16e116616ab29c1b672ae4ed08d397fac014d1279b969af3b68
SHA51295f712c21fb677f8ce6578648b6e065357d70523255de7af67471ea3c6e09303eb5adc02bf28f99284f97325181a94f3decdf9882db0d121811e016673f1b990