Analysis
-
max time kernel
142s -
max time network
130s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
28-02-2024 20:14
Static task
static1
Behavioral task
behavioral1
Sample
acc08016e7b4cf74deeb194837b98be8.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
acc08016e7b4cf74deeb194837b98be8.exe
Resource
win10v2004-20240226-en
General
-
Target
acc08016e7b4cf74deeb194837b98be8.exe
-
Size
640KB
-
MD5
acc08016e7b4cf74deeb194837b98be8
-
SHA1
7568cbf3208bac8aebb336e69c8bc9ee21cc7f5a
-
SHA256
f02311a37d4fd920c2cc0d58a7798e1b832a69f2d80952a17f3cc499f66ceee8
-
SHA512
8990039b6321ed4cdb5820403b6a4bdd8a4bc35d72ce289ec562797422daa2eeb76a6eabe394128f906ba9b614f5fda1d2af7c73b7db122c4d4031787eb647c2
-
SSDEEP
12288:52txl3bspb2jdcX/cTGeHrzLUFPTDF3Z4mxxZ9sQ/wD5ywNB9tXD5SC:52trARsd0cTJjUNTDQmXjsQ/wNbVtXD/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2568 SERVER~1.EXE -
Loads dropped DLL 6 IoCs
pid Process 2352 acc08016e7b4cf74deeb194837b98be8.exe 2352 acc08016e7b4cf74deeb194837b98be8.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe 2696 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" acc08016e7b4cf74deeb194837b98be8.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2696 2568 WerFault.exe 28 -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2568 2352 acc08016e7b4cf74deeb194837b98be8.exe 28 PID 2352 wrote to memory of 2568 2352 acc08016e7b4cf74deeb194837b98be8.exe 28 PID 2352 wrote to memory of 2568 2352 acc08016e7b4cf74deeb194837b98be8.exe 28 PID 2352 wrote to memory of 2568 2352 acc08016e7b4cf74deeb194837b98be8.exe 28 PID 2568 wrote to memory of 2696 2568 SERVER~1.EXE 29 PID 2568 wrote to memory of 2696 2568 SERVER~1.EXE 29 PID 2568 wrote to memory of 2696 2568 SERVER~1.EXE 29 PID 2568 wrote to memory of 2696 2568 SERVER~1.EXE 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\acc08016e7b4cf74deeb194837b98be8.exe"C:\Users\Admin\AppData\Local\Temp\acc08016e7b4cf74deeb194837b98be8.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\SERVER~1.EXE2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 2043⤵
- Loads dropped DLL
- Program crash
PID:2696
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
273KB
MD56d3c8b1432b35482e8320e07b22428c8
SHA10b3d68c5d8f78f0743f3b6ab85e4ef7a875d1d1f
SHA256f9123f979b6e16a5a7c788bc9a00f871f1d7a590b7b73dae87c36a634fa331e6
SHA5128b42762f872521d542af128705a39ddc729f99099777608514599ad99b5d06150ca8e735c3a0c19d888c8a47db5d38a0d5a543a0c2f654872274fad21c987ee1