Overview
overview
10Static
static
10Wolfteam/Hack.exe
windows7_x64
10Wolfteam/Hack.exe
windows10_x64
10Wolfteam/S...RT.dll
windows7_x64
Wolfteam/S...RT.dll
windows10_x64
Wolfteam/a..._0.dll
windows7_x64
Wolfteam/a..._0.dll
windows10_x64
Wolfteam/a..._0.dll
windows7_x64
Wolfteam/a..._0.dll
windows10_x64
Wolfteam/a..._0.dll
windows7_x64
Wolfteam/a..._0.dll
windows10_x64
Wolfteam/a..._0.dll
windows7_x64
1Wolfteam/a..._0.dll
windows10_x64
1Wolfteam/python27.dll
windows7_x64
Wolfteam/python27.dll
windows10_x64
Analysis
-
max time kernel
29s -
max time network
13s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
25-03-2021 22:00
Behavioral task
behavioral1
Sample
Wolfteam/Hack.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Wolfteam/Hack.exe
Resource
win10v20201028
Behavioral task
behavioral3
Sample
Wolfteam/SpeedTreeRT.dll
Resource
win7v20201028
Behavioral task
behavioral4
Sample
Wolfteam/SpeedTreeRT.dll
Resource
win10v20201028
Behavioral task
behavioral5
Sample
Wolfteam/api_ms_win_core_interlocked_l1_1_0.dll
Resource
win7v20201028
Behavioral task
behavioral6
Sample
Wolfteam/api_ms_win_core_interlocked_l1_1_0.dll
Resource
win10v20201028
Behavioral task
behavioral7
Sample
Wolfteam/api_ms_win_core_synch_l1_1_0.dll
Resource
win7v20201028
Behavioral task
behavioral8
Sample
Wolfteam/api_ms_win_core_synch_l1_1_0.dll
Resource
win10v20201028
Behavioral task
behavioral9
Sample
Wolfteam/api_ms_win_core_timezone_l1_1_0.dll
Resource
win7v20201028
Behavioral task
behavioral10
Sample
Wolfteam/api_ms_win_core_timezone_l1_1_0.dll
Resource
win10v20201028
Behavioral task
behavioral11
Sample
Wolfteam/api_ms_win_crt_locale_l1_1_0.dll
Resource
win7v20201028
Behavioral task
behavioral12
Sample
Wolfteam/api_ms_win_crt_locale_l1_1_0.dll
Resource
win10v20201028
Behavioral task
behavioral13
Sample
Wolfteam/python27.dll
Resource
win7v20201028
Behavioral task
behavioral14
Sample
Wolfteam/python27.dll
Resource
win10v20201028
Errors
General
-
Target
Wolfteam/SpeedTreeRT.dll
-
Size
1.7MB
-
MD5
1ac3d612389fa679f5ca3c6bab855145
-
SHA1
2f4f279d0c99c112db1adee5a3c324d0355fcbf5
-
SHA256
ddba9b9b427d541ebc0bf1221fffc5d56a85d7b8ee0dfe6370a83a133da6967b
-
SHA512
847376db96f3a3c1ab844fbf066f4e0e05b203769d7ca04fdf2463e86fc99ea1589054d1cc10ff70e45a5fb82a9e103edc2aa17b76cd94497cd49fedb6e06788
Malware Config
Signatures
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 1444 1640 WerFault.exe rundll32.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
WerFault.exepid process 1444 WerFault.exe 1444 WerFault.exe 1444 WerFault.exe 1444 WerFault.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
WerFault.exedescription pid process Token: SeDebugPrivilege 1444 WerFault.exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
rundll32.exerundll32.exedescription pid process target process PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1684 wrote to memory of 1640 1684 rundll32.exe rundll32.exe PID 1640 wrote to memory of 1444 1640 rundll32.exe WerFault.exe PID 1640 wrote to memory of 1444 1640 rundll32.exe WerFault.exe PID 1640 wrote to memory of 1444 1640 rundll32.exe WerFault.exe PID 1640 wrote to memory of 1444 1640 rundll32.exe WerFault.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Wolfteam\SpeedTreeRT.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\Wolfteam\SpeedTreeRT.dll,#12⤵
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 2283⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1444
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x01⤵PID:1272
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x11⤵PID:320
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/320-10-0x0000000002820000-0x0000000002821000-memory.dmpFilesize
4KB
-
memory/1272-7-0x000007FEFC2C1000-0x000007FEFC2C3000-memory.dmpFilesize
8KB
-
memory/1272-8-0x00000000027C0000-0x00000000027C1000-memory.dmpFilesize
4KB
-
memory/1444-4-0x0000000000000000-mapping.dmp
-
memory/1444-5-0x0000000002090000-0x00000000020A1000-memory.dmpFilesize
68KB
-
memory/1444-6-0x00000000004F0000-0x00000000004F1000-memory.dmpFilesize
4KB
-
memory/1640-2-0x0000000000000000-mapping.dmp
-
memory/1640-3-0x00000000756A1000-0x00000000756A3000-memory.dmpFilesize
8KB