Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 05:46
Static task
static1
Behavioral task
behavioral1
Sample
20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe
Resource
win10v2004-20240802-en
General
-
Target
20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe
-
Size
291KB
-
MD5
e429fe0fc0f2e7219ec097cf5fdc7160
-
SHA1
08b45aaed59f58d88684cab223c817f16062debd
-
SHA256
20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872c
-
SHA512
f71ed385d4e169fa44d62901d8c2059f83aae15671e25a686f6a10a1ca4919410199bed95caf8b831302b38ef8429c18aa34ccc940fc88826aaed080329c9e22
-
SSDEEP
6144:S/0uod/r8s82NQCwJF1eUfxZYJG2pwj6+82DrNz3W4LhvPjY:SJa92CmFWmO+7Dd3vhXE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2660 serv.exe -
Loads dropped DLL 6 IoCs
pid Process 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 2660 serv.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\RunOnce\wextract_cleanup0 = "rundll32.exe C:\\Windows\\system32\\advpack.dll,DelNodeRunDLL32 \"C:\\Users\\Admin\\AppData\\Local\\Temp\\IXP000.TMP\\\"" 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2760 2660 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language serv.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 1960 wrote to memory of 2660 1960 20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe 30 PID 2660 wrote to memory of 2760 2660 serv.exe 31 PID 2660 wrote to memory of 2760 2660 serv.exe 31 PID 2660 wrote to memory of 2760 2660 serv.exe 31 PID 2660 wrote to memory of 2760 2660 serv.exe 31 PID 2660 wrote to memory of 2760 2660 serv.exe 31 PID 2660 wrote to memory of 2760 2660 serv.exe 31 PID 2660 wrote to memory of 2760 2660 serv.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe"C:\Users\Admin\AppData\Local\Temp\20b678dc028741e96f7cf0bb33ce84415dee539518472c67343ce52cbc45872cN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\IXP000.TMP\serv.exeC:\Users\Admin\AppData\Local\Temp\IXP000.TMP\serv.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 2683⤵
- Loads dropped DLL
- Program crash
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
312KB
MD593d9bf18946a2ff3c8d91953726d0d65
SHA17e08022cf319ebaf3bb22fb4a2d898d9739cfee6
SHA25616cf040ebf018d43590eb173e8d2c09bfe1c1c46d0c848091580cbe1fffad0a8
SHA5123001649c3e26889d5d8b81bd972a71642e1ca5c766b15dc55ffac2dccbd11d91cff7c58f5457a272aef2102f12cc03a4afc6b3a8b929f05f132c64a0a98e9637