Analysis
-
max time kernel
93s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
28/02/2024, 21:59
Static task
static1
Behavioral task
behavioral1
Sample
acf5ca8b70baaa432b5698e327e96e5e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acf5ca8b70baaa432b5698e327e96e5e.exe
Resource
win10v2004-20240226-en
General
-
Target
acf5ca8b70baaa432b5698e327e96e5e.exe
-
Size
662KB
-
MD5
acf5ca8b70baaa432b5698e327e96e5e
-
SHA1
273eafca4e4ded65ae01ee1bea5a84b6eff61cc1
-
SHA256
d2e16fa51a0b63c2b6809cf7812ea5d1019305fe895677a37b831656d3fcf4e4
-
SHA512
ecb14ab96adff34b7ffd5664b0f5657da1f2408973ef93989e64e3d12db7130364d2701d4b392d248819f8bd66c1f46767cd62b97111f16dc57dbb0ba973a8fd
-
SSDEEP
12288:3ffWnjCPyEEuj8vb9Abpdfuszn8TiJHRF3Z4mxxYDqVTVOCk:PfPX4z9+/JLppRQmX/VTzk
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 212 4.exe 4960 Ly_Server2008.exe 2388 4.exe 3168 Ly_Server2008.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" acf5ca8b70baaa432b5698e327e96e5e.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\Ly_Server2008.exe 4.exe File created C:\Windows\SysWOW64\Ly_Server2008.exe 4.exe File opened for modification C:\Windows\SysWOW64\Ly_Server2008.exe Ly_Server2008.exe File created C:\Windows\SysWOW64\Ly_Server2008.exe 4.exe File opened for modification C:\Windows\SysWOW64\Ly_Server2008.exe 4.exe File opened for modification C:\Windows\SysWOW64\Ly_Server2008.exe Ly_Server2008.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\uninstal.bat 4.exe File opened for modification C:\Windows\uninstal.bat 4.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 4072 wrote to memory of 212 4072 acf5ca8b70baaa432b5698e327e96e5e.exe 87 PID 4072 wrote to memory of 212 4072 acf5ca8b70baaa432b5698e327e96e5e.exe 87 PID 4072 wrote to memory of 212 4072 acf5ca8b70baaa432b5698e327e96e5e.exe 87 PID 212 wrote to memory of 4020 212 4.exe 92 PID 212 wrote to memory of 4020 212 4.exe 92 PID 212 wrote to memory of 4020 212 4.exe 92 PID 4072 wrote to memory of 2388 4072 acf5ca8b70baaa432b5698e327e96e5e.exe 94 PID 4072 wrote to memory of 2388 4072 acf5ca8b70baaa432b5698e327e96e5e.exe 94 PID 4072 wrote to memory of 2388 4072 acf5ca8b70baaa432b5698e327e96e5e.exe 94 PID 2388 wrote to memory of 1360 2388 4.exe 98 PID 2388 wrote to memory of 1360 2388 4.exe 98 PID 2388 wrote to memory of 1360 2388 4.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\acf5ca8b70baaa432b5698e327e96e5e.exe"C:\Users\Admin\AppData\Local\Temp\acf5ca8b70baaa432b5698e327e96e5e.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4072 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:212 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:4020
-
-
-
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\4.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Windows\uninstal.bat3⤵PID:1360
-
-
-
C:\Windows\SysWOW64\Ly_Server2008.exeC:\Windows\SysWOW64\Ly_Server2008.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4960
-
C:\Windows\SysWOW64\Ly_Server2008.exeC:\Windows\SysWOW64\Ly_Server2008.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:3168
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
760KB
MD5f4593ce8a357d4733f8f4e92643ddaa8
SHA1a1b20a42dae75445f1ea9e7e3e0ded23093d49ed
SHA256c53a4fe2a0b299c871e84737b5355d63b11c9e80855860e3254fbb365718a646
SHA5122669073ffd4bf12c46c7045a3df9ff9926e3ba52286fc28ef07c6394bf940493a38f77117ca059a2732ae8189c3c91a2ebb8e1a5f6f654bb30e904fff4515bb7
-
Filesize
150B
MD55edd682a8b1f2bf873300774f954ab03
SHA12cca4e743d02dbccf31b784ea26a60c03dcc9637
SHA256a34c51ec5d2ac66ef75719e7dee61b6e89e74d054712438da2585ec92ce0865a
SHA512916f0e846a38f63aae996e2a3957fa24fed3bcaa6add68c529e3cc0aa063dca49b98d42c92317bfc2f43d745c492e1e1e6f5db0c986b9682f4b9b0cf0afd7bd2