Analysis
-
max time kernel
167s -
max time network
204s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12/05/2022, 11:41
Static task
static1
Behavioral task
behavioral1
Sample
69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe
Resource
win10v2004-20220414-en
General
-
Target
69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe
-
Size
300KB
-
MD5
b84cb1bf75e472973bed157bab410f04
-
SHA1
fe4d97e9fd68677ae1e1b459885b3979eabba445
-
SHA256
69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a
-
SHA512
266128f62ef53d596196bed76ef94c9aef135f248a2c0a9b44a909bdff4613a048875d9a8debf7082e50eea29acb32891fd7edc535d085558a9250a5f402c9a8
Malware Config
Extracted
buer
https://officewestunionbank.com/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\b5aab841835fc04b77f7\\AutoReg.exe\"" AutoReg.exe -
resource yara_rule behavioral2/memory/1800-131-0x0000000000530000-0x000000000058C000-memory.dmp buer behavioral2/memory/1800-135-0x0000000040000000-0x0000000040BA8000-memory.dmp buer behavioral2/memory/1964-137-0x00000000004D0000-0x000000000052C000-memory.dmp buer behavioral2/memory/1964-138-0x0000000040000000-0x0000000040BA8000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1964 AutoReg.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: AutoReg.exe File opened (read-only) \??\R: AutoReg.exe File opened (read-only) \??\T: AutoReg.exe File opened (read-only) \??\W: AutoReg.exe File opened (read-only) \??\G: AutoReg.exe File opened (read-only) \??\L: AutoReg.exe File opened (read-only) \??\S: AutoReg.exe File opened (read-only) \??\V: AutoReg.exe File opened (read-only) \??\N: AutoReg.exe File opened (read-only) \??\Q: AutoReg.exe File opened (read-only) \??\U: AutoReg.exe File opened (read-only) \??\Z: AutoReg.exe File opened (read-only) \??\B: AutoReg.exe File opened (read-only) \??\H: AutoReg.exe File opened (read-only) \??\F: AutoReg.exe File opened (read-only) \??\I: AutoReg.exe File opened (read-only) \??\J: AutoReg.exe File opened (read-only) \??\K: AutoReg.exe File opened (read-only) \??\M: AutoReg.exe File opened (read-only) \??\P: AutoReg.exe File opened (read-only) \??\A: AutoReg.exe File opened (read-only) \??\E: AutoReg.exe File opened (read-only) \??\X: AutoReg.exe File opened (read-only) \??\Y: AutoReg.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4248 1800 WerFault.exe 69 -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1800 wrote to memory of 1964 1800 69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe 80 PID 1800 wrote to memory of 1964 1800 69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe 80 PID 1800 wrote to memory of 1964 1800 69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe"C:\Users\Admin\AppData\Local\Temp\69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1800 -
C:\ProgramData\b5aab841835fc04b77f7\AutoReg.exeC:\ProgramData\b5aab841835fc04b77f7\AutoReg.exe "C:\Users\Admin\AppData\Local\Temp\69377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Enumerates connected drives
PID:1964
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 4402⤵
- Program crash
PID:4248
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 1800 -ip 18001⤵PID:4064
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
300KB
MD5b84cb1bf75e472973bed157bab410f04
SHA1fe4d97e9fd68677ae1e1b459885b3979eabba445
SHA25669377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a
SHA512266128f62ef53d596196bed76ef94c9aef135f248a2c0a9b44a909bdff4613a048875d9a8debf7082e50eea29acb32891fd7edc535d085558a9250a5f402c9a8
-
Filesize
300KB
MD5b84cb1bf75e472973bed157bab410f04
SHA1fe4d97e9fd68677ae1e1b459885b3979eabba445
SHA25669377f70dc61fe37d51443a5ce8a312aa7b682c61574b8ff02fef4e9d798133a
SHA512266128f62ef53d596196bed76ef94c9aef135f248a2c0a9b44a909bdff4613a048875d9a8debf7082e50eea29acb32891fd7edc535d085558a9250a5f402c9a8