Analysis
-
max time kernel
143s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
b9f66ef1ba585f459cf38fbb06f1c559.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9f66ef1ba585f459cf38fbb06f1c559.exe
Resource
win10v2004-20240226-en
General
-
Target
b9f66ef1ba585f459cf38fbb06f1c559.exe
-
Size
3.1MB
-
MD5
b9f66ef1ba585f459cf38fbb06f1c559
-
SHA1
46ddb8967ed9092681d6e8cd32318ce0b9263413
-
SHA256
ecdbfea71a088d59faf8ca4529c9d390d6453de442d5d93effd9877347e7804f
-
SHA512
2d810e2cbc45feb19d55a5303bbcedb58018eb86120e0eeec028d820318306b78c2ec275e9de77ef5f3474a85eebadc257f9186e9fce68086af2f131445b504f
-
SSDEEP
49152:l/A+Ar4cJBk1aBk1RBk1kBk1FBk14Bk1ubrBqBk1ldBsgCBsgZBsgSBsgXBsgIBE:l/A+ArvxrBjKetmFdSPg/qOGey
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1984 autopatch.exe -
Loads dropped DLL 4 IoCs
pid Process 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 1984 autopatch.exe 1984 autopatch.exe 1984 autopatch.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b9f66ef1ba585f459cf38fbb06f1c559.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28 PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28 PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28 PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28 PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28 PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28 PID 2036 wrote to memory of 1984 2036 b9f66ef1ba585f459cf38fbb06f1c559.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9f66ef1ba585f459cf38fbb06f1c559.exe"C:\Users\Admin\AppData\Local\Temp\b9f66ef1ba585f459cf38fbb06f1c559.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\autopatch.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\autopatch.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
21KB
MD5dcfb1d995b0b350a5ceb497641cb33a8
SHA11f2eae7216fa4d23b6996f38ae91ff9c61cf2618
SHA256a70e68b1a47327b46c5a62af1d2c38bfe97f9e2d8153e2cd97181925d66f7430
SHA512629d6e70d69f97014b82d90e19677dd5f2c5e1361f9c747fdeb79c3a54bfe63060fec3c971cc36fdde6efb901d496a490e79cc89012e86f07e860fcbf98fc530