Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/03/2024, 12:56
Static task
static1
Behavioral task
behavioral1
Sample
b8c8519e40c7d4fb105a89ba33501b7e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b8c8519e40c7d4fb105a89ba33501b7e.exe
Resource
win10v2004-20240226-en
General
-
Target
b8c8519e40c7d4fb105a89ba33501b7e.exe
-
Size
872KB
-
MD5
b8c8519e40c7d4fb105a89ba33501b7e
-
SHA1
cad2759b454bc6f8cf50a5b799ac17f581fbb884
-
SHA256
c432756c4f332b231837f895c85790265b614dd42d0c7652cfad91eec6b43089
-
SHA512
10b567f6d228ded53cf810c6f4e89e51cfbcb59e8578ce95ca9b554ff83b71d74cfa97c182155da3b8b04347db9b2aa7e05d2c00e6a2b9cba528605c1b4de517
-
SSDEEP
24576:yCfEtSfZT7a2AigI644rMWW9FP86XblVO:DctuT7a1izerHWnTZk
Malware Config
Signatures
-
Modifies Installed Components in the registry 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S} regsvr32.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S}\StubPath = "C:\\Windows\\system32\\OLE32Init.exe" regsvr32.exe Key created \REGISTRY\MACHINE\Software\WOW6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S} Sender.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Active Setup\Installed Components\{7M8A6G00-3I18-11C0-821H-444200140P0S}\StubPath = "C:\\Windows\\system32\\OLE32Init.exe" Sender.exe -
Executes dropped EXE 2 IoCs
pid Process 3944 Sender.exe 4744 regsvr32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" b8c8519e40c7d4fb105a89ba33501b7e.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\COMCTL32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File created C:\Windows\SysWOW64\COMCTL32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File opened for modification C:\Windows\SysWOW64\VERSION.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File created C:\Windows\SysWOW64\VERSION.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File opened for modification C:\Windows\SysWOW64\OLE32Init.exe Sender.exe File created C:\Windows\SysWOW64\OLE32Init.exe Sender.exe File opened for modification C:\Windows\SysWOW64\ADVAPI32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe File created C:\Windows\SysWOW64\ADVAPI32.dll b8c8519e40c7d4fb105a89ba33501b7e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\regsvr32.exe Sender.exe File created C:\Windows\regsvr32.exe Sender.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4744 regsvr32.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1452 wrote to memory of 3944 1452 b8c8519e40c7d4fb105a89ba33501b7e.exe 87 PID 1452 wrote to memory of 3944 1452 b8c8519e40c7d4fb105a89ba33501b7e.exe 87 PID 1452 wrote to memory of 3944 1452 b8c8519e40c7d4fb105a89ba33501b7e.exe 87 PID 3944 wrote to memory of 4744 3944 Sender.exe 95 PID 3944 wrote to memory of 4744 3944 Sender.exe 95 PID 3944 wrote to memory of 4744 3944 Sender.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\b8c8519e40c7d4fb105a89ba33501b7e.exe"C:\Users\Admin\AppData\Local\Temp\b8c8519e40c7d4fb105a89ba33501b7e.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sender.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\Sender.exe2⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3944 -
C:\Windows\regsvr32.exeC:\Windows\regsvr32.exe3⤵
- Modifies Installed Components in the registry
- Executes dropped EXE
- Suspicious behavior: GetForegroundWindowSpam
PID:4744
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
44KB
MD56a8f79f987ca62a8567061fabf358b00
SHA11ebec4291dc2a4b6a82352511b7c8316cab1c273
SHA256df418db45a9d3a6dcd9da65ca9734afdacd85631f47658b1bd2b91b98342af95
SHA51276536a5d39850d40b80d636e06430380484222443a71bcc3be01d52bcab9f03fb08dce1f52fa6cae220e46eab3162cde063ae2b53b9d8edc09237e033941f118
-
Filesize
44KB
MD5b927c58ab0563c9d621adcaefd456364
SHA19fa2dea65b69ef1e063f09220632d8dcf2fc5d00
SHA25616935c28c6f1b214954be975ad31cf1599a390c973a48fb89d09de18b7032af4
SHA512d05ec0abb44a0369dc80285bd882c5c9e5c4e348d4a7fcd04ddbeb9819bffa721a6f832dc5608704eec5cf5aa03fad50f8ec37de37c5e3a4923211c6efaef191