Overview
overview
10Static
static
30033b9ed1c...40.exe
windows7-x64
30033b9ed1c...40.exe
windows10-2004-x64
101277233607...ba.exe
windows10-2004-x64
10138ff2ce9b...de.exe
windows10-2004-x64
73a88637efb...d4.exe
windows10-2004-x64
85a4570005d...a4.exe
windows7-x64
35a4570005d...a4.exe
windows10-2004-x64
106ade7154c7...fb.exe
windows7-x64
36ade7154c7...fb.exe
windows10-2004-x64
108167afa496...61.exe
windows7-x64
38167afa496...61.exe
windows10-2004-x64
1086a6beb680...62.exe
windows10-2004-x64
108bd2da3bdd...7e.exe
windows10-2004-x64
109b9cb00d14...04.exe
windows10-2004-x64
109e375a6be4...d0.exe
windows7-x64
39e375a6be4...d0.exe
windows10-2004-x64
10a228d77265...ea.exe
windows7-x64
3a228d77265...ea.exe
windows10-2004-x64
10b565c9e6f0...8a.exe
windows7-x64
3b565c9e6f0...8a.exe
windows10-2004-x64
10dffc83be30...0a.exe
windows10-2004-x64
10ebff69daab...05.exe
windows10-2004-x64
10ee1d385890...f3.exe
windows7-x64
3ee1d385890...f3.exe
windows10-2004-x64
10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
14-05-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
0033b9ed1c09bad0795150029eeb32a7620ee7b6768eb42c36c9ecdece2dd440.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0033b9ed1c09bad0795150029eeb32a7620ee7b6768eb42c36c9ecdece2dd440.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
127723360773375a1005cb7ffdbb02b75f03e7f7a488e47fc79f18439c3371ba.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral4
Sample
138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral5
Sample
3a88637efb4cafae6238b6c3dc5b6b17b7a535e47a3f6a230dcc5cf428db3ad4.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral6
Sample
5a4570005d13d7c9c706dbdc0cc5ee5b8dfd33f7be6a6204a95d2134e3a483a4.exe
Resource
win7-20231129-en
Behavioral task
behavioral7
Sample
5a4570005d13d7c9c706dbdc0cc5ee5b8dfd33f7be6a6204a95d2134e3a483a4.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral8
Sample
6ade7154c76ec8ac19448403d594b3b6aaaaa14c5a193f4f31694ff3643d45fb.exe
Resource
win7-20240221-en
Behavioral task
behavioral9
Sample
6ade7154c76ec8ac19448403d594b3b6aaaaa14c5a193f4f31694ff3643d45fb.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral10
Sample
8167afa4960bf7ec3e9ccea8204567bf3c18d20b72fe034ca2fe482d19f96f61.exe
Resource
win7-20240508-en
Behavioral task
behavioral11
Sample
8167afa4960bf7ec3e9ccea8204567bf3c18d20b72fe034ca2fe482d19f96f61.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral12
Sample
86a6beb6802f9ec2aa387143ba41461fb82783226223ba68b44e49b21c8d3d62.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral13
Sample
8bd2da3bdd49625487058350b98633f194eeda83697690c729fefcefc188b07e.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral14
Sample
9b9cb00d14cf7c8d3f4e64b8dd4573bad195ee266c5cffcf820f398e5a51ae04.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral15
Sample
9e375a6be43c6fb35a506cdbbab7a9291cd783ccc69adf51e1cf73f8e1c949d0.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
9e375a6be43c6fb35a506cdbbab7a9291cd783ccc69adf51e1cf73f8e1c949d0.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
a228d772653c687276cdf5b1bc02ef2c37eb367c1d2dbdef0e221c3b16ce87ea.exe
Resource
win7-20231129-en
Behavioral task
behavioral18
Sample
a228d772653c687276cdf5b1bc02ef2c37eb367c1d2dbdef0e221c3b16ce87ea.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral19
Sample
b565c9e6f0f8b9856b032a9a41f04204d306f060af94e74bea3cfb296522818a.exe
Resource
win7-20240221-en
Behavioral task
behavioral20
Sample
b565c9e6f0f8b9856b032a9a41f04204d306f060af94e74bea3cfb296522818a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
dffc83be30add96232b3b63c25cbfc4874904cd04fd2658d0ecd5979a7caa40a.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral22
Sample
ebff69daab03914f10326e4e3ec464c00bfa9568723a75f80d74a19f1ac9dc05.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral23
Sample
ee1d3858900f809c3008350e86070aa4ffffa399e13f538b41006cf42f5648f3.exe
Resource
win7-20240221-en
Behavioral task
behavioral24
Sample
ee1d3858900f809c3008350e86070aa4ffffa399e13f538b41006cf42f5648f3.exe
Resource
win10v2004-20240226-en
General
-
Target
138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe
-
Size
33.9MB
-
MD5
8bca5e8930ba6be4bd9ba59bc4d2f237
-
SHA1
bd7a540af2662707c7b02871efea7e84085129fb
-
SHA256
138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde
-
SHA512
26945f56dc71ea5d3e5359202bc2098b23e31ad4fcf4a3fbdaade2aee2d2e50cf945c884bdf94dc5d949f14770d9d15dfc442cb58e0f50e368f58b3b923fafba
-
SSDEEP
786432:b3yJy4bYpVyTO9NQAR29u1ocoMnTtXTzr6vmU5JaYmZJR:LyJy4sjyTuNQN9aocoqJXTz2OSaFHR
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
admnstup.exepid process 5032 admnstup.exe -
Loads dropped DLL 4 IoCs
Processes:
admnstup.exepid process 5032 admnstup.exe 5032 admnstup.exe 5032 admnstup.exe 5032 admnstup.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 21 IoCs
Processes:
admnstup.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\InprocHandler\ = "ole2.dll" admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\InprocHandler32 admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\InprocHandler32\ = "ole32.dll" admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\ProgID admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953} admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib\ = "{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}" admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953} admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B} admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\ = "OLE 2.0 Link" admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\ProgID\ = "Access.OLE2Link" admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib\ = "{1EA4DBF0-3C3B-11CF-810C-00AA00389B71}" admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{F7A9C6E0-EFF2-101A-8185-00DD01108C6B}\InprocHandler admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib\Version = "1.1" admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\ProxyStubClsid32\ = "{00020424-0000-0000-C000-000000000046}" admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib admnstup.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{618736E0-3C3D-11CF-810C-00AA00389B71}\TypeLib\Version = "1.1" admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\Interface admnstup.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\Interface\{03022430-ABC4-11D0-BDE2-00AA001A1953}\TypeLib admnstup.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
admnstup.exepid process 5032 admnstup.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exedescription pid process target process PID 4320 wrote to memory of 5032 4320 138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe admnstup.exe PID 4320 wrote to memory of 5032 4320 138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe admnstup.exe PID 4320 wrote to memory of 5032 4320 138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe admnstup.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe"C:\Users\Admin\AppData\Local\Temp\138ff2ce9b173f8265df2a779714f1533ce9b51c1c9823b118a7fc654853ecde.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4320 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\admnstup.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\admnstup.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:5032
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
340KB
MD586f1895ae8c5e8b17d99ece768a70732
SHA1d5502a1d00787d68f548ddeebbde1eca5e2b38ca
SHA2568094af5ee310714caebccaeee7769ffb08048503ba478b879edfef5f1a24fefe
SHA5123b7ce2b67056b6e005472b73447d2226677a8cadae70428873f7efa5ed11a3b3dbf6b1a42c5b05b1f2b1d8e06ff50dfc6532f043af8452ed87687eefbf1791da
-
Filesize
4.5MB
MD5074bd3b7cd21ea7e0013d62caee4dacf
SHA1433cabb03b4ecfe4cc55ecee90d33b050a7240e4
SHA25600e629266bab84966a2b386298f2f1ecc6c6e3c73efe2a8d15cde3a7c03d63c7
SHA5123189d60d0e8e4745d83ec960f76784206ede98715d4503d64b1485b153f3d11deeac9ee7b8308009f23e13b99ad49fed8244f4f1411421830618cf48c001713a
-
Filesize
1.1MB
MD572cf503ed5085888009577aada63f6a3
SHA1d1710217f6126554d33831e2f3d0ab95a93dd178
SHA256de618974f0ac3865ec6ebd70137b9b69139cc1c9952ca089dd7370ad9b757981
SHA512599837099bca17be4346b1a3c8fab3d1bf14c0a9a57ffd15fd32335c335452a981a2e37ad1c1d3c873ef306a336435b119ee87d35a0de82583b7eb140b233af2
-
Filesize
2KB
MD5a517c3da4484229a25a6cc4e56e17ce2
SHA172dda2adbf6e2ecb7f0be8067b84fc6b46653f08
SHA256dd6f9bea6cae85d218a643be95a042e48503de4c2b3f2d30fa440c0ffc4c1006
SHA512488618f51322fa89c1d3623ff0116e6d8ed6c1dde20d05ee9370ef0ad4a6c0279af3adcb2e7b1b4cb2416d050f57d510b95c5d9420aef8b089bca0a3a482f4d6
-
Filesize
2.1MB
MD5a09f7349da288fe12d6ea2e9e5f04e21
SHA10538977c39d4f01b515cac86dbca6d395c8185d9
SHA25610745b9a86c942d6559e2ad74593fb471cc1841e2b11dc6e37e240c4a7fcf105
SHA5120329b1626f9f0afabf45b25de3115326d77a852704c991cb90a863b22e15c085f008b88eebc5e9d5aa3037d0550e550741bc1a98512baae7cc4590a84c44c8e1
-
Filesize
1.6MB
MD54d328694bb516e46d2d184950d94433f
SHA19b31771a8c201b74c846da1f1a254866dc2f912d
SHA2568199452af9e5289c126d0ff9d99f2302c52861ec49008702b7f95d64d316383c
SHA512dadf21cb702e309ba0f271e13a9c3e9d4bdb5cdd79699d331242c988c591716c265c11fb5a35a8b0d5892861d1c6d519ace228f2d4fcf0d3e604e33be4fa7cd2
-
Filesize
43KB
MD56d87707b9d936f89dcb30db009b5a7b6
SHA16a7710f5593f0cc28feacdc83235dabf69b5edbd
SHA2561c6d1d5059d085c0ba330170ad13dbb29fb076f4d49033e3b484298464e7658c
SHA5126dbc4511bd224b304fbf655ff4f68ec4cfb35d0b0696931109d0cdcf2b5cf0b454a4ae4db2468fa7e9e76ad318007b416971403b32e2069fec67493fa379bbe6
-
Filesize
512B
MD532faff29cfd5153d66cb4e8539dc0e76
SHA154f8bf9b8ccfce491f309d9566b6b9c7e9ce3c6a
SHA256b11162605d45a90c5250b12fd0df62ed463de2ad7430d2f24033b57ca014f9ef
SHA512ecf9f89928544b85ff8ab7d4f682a101fe821437ddc240f666fe70562806e54fed97b6e87e5859838a5a86bff041ede1c54cadacec8e5a850c4f06952b22dc61