Analysis
-
max time kernel
148s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
b8c8519e40c7d4fb105a89ba33501b7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8c8519e40c7d4fb105a89ba33501b7e.exe
Resource
win10v2004-20240226-en
General
-
Target
b8c8519e40c7d4fb105a89ba33501b7e.exe
-
Size
872KB
-
MD5
b8c8519e40c7d4fb105a89ba33501b7e
-
SHA1
cad2759b454bc6f8cf50a5b799ac17f581fbb884
-
SHA256
c432756c4f332b231837f895c85790265b614dd42d0c7652cfad91eec6b43089
-
SHA512
10b567f6d228ded53cf810c6f4e89e51cfbcb59e8578ce95ca9b554ff83b71d74cfa97c182155da3b8b04347db9b2aa7e05d2c00e6a2b9cba528605c1b4de517
-
SSDEEP
24576:yCfEtSfZT7a2AigI644rMWW9FP86XblVO:DctuT7a1izerHWnTZk
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S} Sender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S}\StubPath = "C:\\Windows\\system32\\OLE32Init.exe" Sender.exe Key created \REGISTRY\MACHINE\Software\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S}\StubPath = "C:\\Windows\\system32\\OLE32Init.exe" regsvr32.exe -
Executes dropped EXE 2 IoCs
pid Process 2300 Sender.exe 2908 regsvr32.exe -
Loads dropped DLL 3 IoCs
pid Process 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 2300 Sender.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8c8519e40c7d4fb105a89ba33501b7e.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\COMCTL32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File opened for modification C:\Windows\SysWOW64\VERSION.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File created C:\Windows\SysWOW64\VERSION.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File opened for modification C:\Windows\SysWOW64\OLE32Init.exe Sender.exe File created C:\Windows\SysWOW64\OLE32Init.exe Sender.exe File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File created C:\Windows\SysWOW64\ADVAPI32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File opened for modification C:\Windows\SysWOW64\COMCTL32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\regsvr32.exe Sender.exe File created C:\Windows\regsvr32.exe Sender.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2908 regsvr32.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 1640 wrote to memory of 2300 1640 b8c8519e40c7d4fb105a89ba33501b7e.exe 28 PID 2300 wrote to memory of 2908 2300 Sender.exe 29 PID 2300 wrote to memory of 2908 2300 Sender.exe 29 PID 2300 wrote to memory of 2908 2300 Sender.exe 29 PID 2300 wrote to memory of 2908 2300 Sender.exe 29 PID 2300 wrote to memory of 2908 2300 Sender.exe 29 PID 2300 wrote to memory of 2908 2300 Sender.exe 29 PID 2300 wrote to memory of 2908 2300 Sender.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8c8519e40c7d4fb105a89ba33501b7e.exe"C:\Users\Admin\AppData\Local\Temp\b8c8519e40c7d4fb105a89ba33501b7e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sender.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sender.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\regsvr32.exeC:\Windows\regsvr32.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:2908
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD5b927c58ab0563c9d621adcaefd456364
SHA19fa2dea65b69ef1e063f09220632d8dcf2fc5d00
SHA25616935c28c6f1b214954be975ad31cf1599a390c973a48fb89d09de18b7032af4
SHA512d05ec0abb44a0369dc80285bd882c5c9e5c4e348d4a7fcd04ddbeb9819bffa721a6f832dc5608704eec5cf5aa03fad50f8ec37de37c5e3a4923211c6efaef191
-
Filesize
44KB
MD56a8f79f987ca62a8567061fabf358b00
SHA11ebec4291dc2a4b6a82352511b7c8316cab1c273
SHA256df418db45a9d3a6dcd9da65ca9734afdacd85631f47658b1bd2b91b98342af95
SHA51276536a5d39850d40b80d636e06430380484222443a71bcc3be01d52bcab9f03fb08dce1f52fa6cae220e46eab3162cde063ae2b53b9d8edc09237e033941f118