Analysis

  • max time kernel
    549s
  • max time network
    527s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240419-ja
  • resource tags

    arch:x64arch:x86image:win10v2004-20240419-jalocale:ja-jpos:windows10-2004-x64systemwindows
  • submitted
    27-04-2024 22:18

General

  • Target

    werkernel.exe

  • Size

    448KB

  • MD5

    c4dd780560091c8d2da429c7c689f84b

  • SHA1

    a2e36c89eb4cddccc4d73bf0525a0da46258d8a0

  • SHA256

    8b61cadaeda4c14d7bd9e7990c6620e111809cd57ea0ea222063b0cff1f6c316

  • SHA512

    56c000112a85912ec495350604644224af57921e0cfa0f7c405b6edd74e104a2a014164547f3f001e348e79deebc8a6a0918311f2a42a733eb862a64ceabf08f

  • SSDEEP

    12288:f9V25AA7SLpRf7yuuVpqC//7S4wpkNoWFscHGO:f9OAvHf7yuepq8znwq5FsqGO

Score
7/10

Malware Config

Signatures

  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Checks SCSI registry key(s) 3 TTPs 6 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 18 IoCs
  • Suspicious behavior: EnumeratesProcesses 26 IoCs
  • Suspicious use of AdjustPrivilegeToken 22 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\werkernel.exe
    "C:\Users\Admin\AppData\Local\Temp\werkernel.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:3932
    • C:\Users\Admin\AppData\Local\Temp\werkernel.exe
      C:\Users\Admin\AppData\Local\Temp\werkernel.exe
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2364
      • C:\Users\Admin\AppData\Local\Temp\werkernel.exe
        C:\Users\Admin\AppData\Local\Temp\werkernel.exe
        3⤵
        • Checks computer location settings
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of WriteProcessMemory
        PID:4980
        • C:\Windows\System32\cmd.exe
          "C:\Windows\System32\cmd.exe"
          4⤵
            PID:440
          • C:\Windows\System32\cmd.exe
            "C:\Windows\System32\cmd.exe"
            4⤵
              PID:1824
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe"
              4⤵
                PID:1548
              • C:\Windows\System32\cmd.exe
                "C:\Windows\System32\cmd.exe"
                4⤵
                  PID:3436
                • C:\Windows\System32\cmd.exe
                  "C:\Windows\System32\cmd.exe"
                  4⤵
                    PID:1816
            • C:\Windows\system32\dwm.exe
              "dwm.exe"
              1⤵
              • Loads dropped DLL
              • Checks SCSI registry key(s)
              • Enumerates system info in registry
              • Modifies data under HKEY_USERS
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:4760

            Network

            MITRE ATT&CK Matrix ATT&CK v13

            Discovery

            Query Registry

            3
            T1012

            System Information Discovery

            4
            T1082

            Peripheral Device Discovery

            1
            T1120

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Public\Documents\s1.dll
              Filesize

              326KB

              MD5

              3b402bf2f6c71870316ef98f542de4ab

              SHA1

              9649fab1fa0ed9a9023296a94044290e8943b07e

              SHA256

              d0ba0bcc57bf35cd469ffaf352cf950d04358d1d64e127fb9fd05f21d264598d

              SHA512

              15a0fa3acdefc0c9cd57463c43ba2a25f63c75a75107a4b3b97c852fec320732b8d097f01a181a80e5a83655f7fca9b6faca8a8455029f2acce3d948071afe29

            • memory/2364-5-0x00000234CCA10000-0x00000234CCA5E000-memory.dmp
              Filesize

              312KB

            • memory/3932-0-0x00007FFABAF30000-0x00007FFABAF31000-memory.dmp
              Filesize

              4KB

            • memory/3932-2-0x0000022A88F40000-0x0000022A88F8E000-memory.dmp
              Filesize

              312KB

            • memory/4760-10-0x0000022B85820000-0x0000022B8585A000-memory.dmp
              Filesize

              232KB

            • memory/4760-12-0x0000022B85860000-0x0000022B8589F000-memory.dmp
              Filesize

              252KB

            • memory/4980-20-0x000001D756870000-0x000001D7568BE000-memory.dmp
              Filesize

              312KB