Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
13/03/2024, 01:52
Static task
static1
Behavioral task
behavioral1
Sample
c4ab4c65c593d28db7a4d7595041367a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c4ab4c65c593d28db7a4d7595041367a.exe
Resource
win10v2004-20240226-en
General
-
Target
c4ab4c65c593d28db7a4d7595041367a.exe
-
Size
120KB
-
MD5
c4ab4c65c593d28db7a4d7595041367a
-
SHA1
108088f776cac29ef9d174926e43555b2bd7002b
-
SHA256
c6fca3de6992d02c7209b3a5b78b3e7f2c5c3f7a5b2bc95adf16532bed95d517
-
SHA512
cf4dca2e1f0f341e4315a2e8fe5641c24a769e7440cd5249e4d6b3539fdb053eba09ce3a0f9c75606cf8549bcf3f98598740a45b91e31557b9b7768f97d8747f
-
SSDEEP
3072:VGu9BlfzWIbXWm+w0Jm5PscfFFQKbKTjf4tiRaiD0:V/0uo0IKbIgti+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4896 1.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" c4ab4c65c593d28db7a4d7595041367a.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2108 wrote to memory of 4896 2108 c4ab4c65c593d28db7a4d7595041367a.exe 86 PID 2108 wrote to memory of 4896 2108 c4ab4c65c593d28db7a4d7595041367a.exe 86 PID 2108 wrote to memory of 4896 2108 c4ab4c65c593d28db7a4d7595041367a.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\c4ab4c65c593d28db7a4d7595041367a.exe"C:\Users\Admin\AppData\Local\Temp\c4ab4c65c593d28db7a4d7595041367a.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\1.exe2⤵
- Executes dropped EXE
PID:4896
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
73KB
MD50e62a3f2c914f1a6e61f0ce590c31bb8
SHA1519e8b34f9358c7dddf6ba04029ef324ff711b5d
SHA2564b7ab4b29354e4efcda73df1692d156aa3f1f663df876ff07383a12b9799330a
SHA512c85730babbd83047e1bc904b8d65d9ba28682bcd4f5fba109227726a5bc0e05689c73b7b83ba1bc829d7f1986880c9c6606b1e348bde1d70bf0700a6db55f5bc