Overview
overview
8Static
static
1.exe
windows7_x64
11.exe
windows10_x64
8Fallen.exe
windows7_x64
8Fallen.exe
windows10_x64
8Inte.exe
windows7_x64
8Inte.exe
windows10_x64
8LX64
windows7_x64
1LX64
windows10_x64
1Server.exe
windows7_x64
8Server.exe
windows10_x64
8hfs.exe
windows7_x64
6hfs.exe
windows10_x64
6hfs_1.exe
windows7_x64
6hfs_1.exe
windows10_x64
6hg
windows7_x64
1hg
windows10_x64
1java
windows7_x64
1java
windows10_x64
1moren.exe
windows7_x64
6moren.exe
windows10_x64
6Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
10-03-2020 00:09
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v200217
Behavioral task
behavioral3
Sample
Fallen.exe
Resource
win7v200217
Behavioral task
behavioral4
Sample
Fallen.exe
Resource
win10v200217
Behavioral task
behavioral5
Sample
Inte.exe
Resource
win7v200217
Behavioral task
behavioral6
Sample
Inte.exe
Resource
win10v200217
Behavioral task
behavioral7
Sample
LX64
Resource
win7v200217
Behavioral task
behavioral8
Sample
LX64
Resource
win10v200217
Behavioral task
behavioral9
Sample
Server.exe
Resource
win7v200217
Behavioral task
behavioral10
Sample
Server.exe
Resource
win10v200217
Behavioral task
behavioral11
Sample
hfs.exe
Resource
win7v200217
Behavioral task
behavioral12
Sample
hfs.exe
Resource
win10v200217
Behavioral task
behavioral13
Sample
hfs_1.exe
Resource
win7v200217
Behavioral task
behavioral14
Sample
hfs_1.exe
Resource
win10v200217
Behavioral task
behavioral15
Sample
hg
Resource
win7v200217
Behavioral task
behavioral16
Sample
hg
Resource
win10v200217
Behavioral task
behavioral17
Sample
java
Resource
win7v200217
Behavioral task
behavioral18
Sample
java
Resource
win10v200217
Behavioral task
behavioral19
Sample
moren.exe
Resource
win7v200217
Behavioral task
behavioral20
Sample
moren.exe
Resource
win10v200217
General
-
Target
Fallen.exe
-
Size
11KB
-
MD5
1423f94092ba6a80ec571748e08d396e
-
SHA1
3839e76d9f01f9a92304cab21aa130f5800f71d2
-
SHA256
f595233fa17f4f280bd88b012419652b8d11f086ccc497ab5c796eba39498e60
-
SHA512
197fb512e2ee4d4cd3bf499e70a1ffda8e107efc6e6a354622448b7dac575701d6f2288df97db568df7e27e780750bc4c3337ffc869adffbd21b013c69aba18f
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
Server.exepid process 1996 Server.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
Fallen.exepid process 3792 Fallen.exe -
Drops file in Windows directory 2 IoCs
Processes:
Fallen.exedescription ioc process File created C:\Windows\Server.exe Fallen.exe File opened for modification C:\Windows\Server.exe Fallen.exe -
Modifies service 2 TTPs 1 IoCs
Processes:
Fallen.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Vwxyab Defghijk Mno\Description = "Vwxyab Defghijk Mnopqrst Vwxy" Fallen.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Server.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Server.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz Server.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Fallen.exe"C:\Users\Admin\AppData\Local\Temp\Fallen.exe"1⤵
- Suspicious behavior: RenamesItself
- Drops file in Windows directory
- Modifies service
-
C:\Windows\Server.exeC:\Windows\Server.exe1⤵
- Executes dropped EXE
- Checks processor information in registry