Analysis
-
max time kernel
16s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
25-03-2024 16:50
Static task
static1
Behavioral task
behavioral1
Sample
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
Resource
win10v2004-20240226-en
General
-
Target
de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe
-
Size
1.2MB
-
MD5
de7b4c9c5c29ab6cdcf1e30bbe7fc25f
-
SHA1
5941c112ffcbe6b197b919803ab81d486625fd82
-
SHA256
ce7b09524d97403326d9d1921decc7091583e257dcb529fd84d538264a9a7221
-
SHA512
aef6c1190b4b65510234150e43b39c808c082759f6cef246bcee430d2984b9ee55a185a0dad17fbd6e9cba19d55eac83d14a46018978f5ddca95dd997f6db341
-
SSDEEP
24576:iLMiACnO3AuyyoSY5ZOA4+Py3aJ3ozQmXmYtfujO:RBIOtpoS7AJPjFoEmX+O
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1660 ¸´¼þ4~1.EXE -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe -
Program crash 3 IoCs
pid pid_target Process procid_target 3552 1660 WerFault.exe 89 4452 1660 WerFault.exe 89 3196 1660 WerFault.exe 89 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3632 wrote to memory of 1660 3632 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 89 PID 3632 wrote to memory of 1660 3632 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 89 PID 3632 wrote to memory of 1660 3632 de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe"C:\Users\Admin\AppData\Local\Temp\de7b4c9c5c29ab6cdcf1e30bbe7fc25f.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3632 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ4~1.EXEC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\¸´¼þ4~1.EXE2⤵
- Executes dropped EXE
PID:1660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2203⤵
- Program crash
PID:3552
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2283⤵
- Program crash
PID:4452
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1660 -s 2563⤵
- Program crash
PID:3196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 1660 -ip 16601⤵PID:1368
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1660 -ip 16601⤵PID:3768
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 1660 -ip 16601⤵PID:1664
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
837KB
MD5cdb5b0b5f855207097d7e3dd85a7510f
SHA1427674a461e5273bbfe40a17c5a6feca32105b9b
SHA256c1f253144d4b16e9e1b2a6fb1e95fd01f7c9f20a0397856e96305ddd26c5ec22
SHA5129d9f302cdb6686ffa2a34824fd50ddd4b0cff566b8d63fab3e60a12928467e79aa364528d699faa86144719ae191ec2f9d95597e8b3b84c6ce1329258c210509