Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
25-05-2022 01:49
Static task
static1
Behavioral task
behavioral1
Sample
1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe
Resource
win10v2004-20220414-en
General
-
Target
1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe
-
Size
144KB
-
MD5
37d8bced898bf955130f39645eba3f0a
-
SHA1
c411ffa43ad7cf7bf321017e9a2d7d9bae1f0cf5
-
SHA256
1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9
-
SHA512
1ae8c515a0a820552c8861fdde197dee0ea0f7fabae74ee4fac9c345f0e1dadf5448b0787cbedfa9e960980419dd3f59fbb8cae8da84df74283348ac80554eaa
Malware Config
Extracted
buer
https://rawcookies.ru/
https://westkingz.ru/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\cfb2287ad52cb75b3e24\\gennt.exe\"" gennt.exe -
resource yara_rule behavioral2/memory/4992-135-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral2/memory/4992-137-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral2/memory/4992-138-0x0000000040000000-0x000000004000C000-memory.dmp buer behavioral2/memory/2636-147-0x0000000040000000-0x000000004000C000-memory.dmp buer -
Executes dropped EXE 2 IoCs
pid Process 2384 gennt.exe 2636 gennt.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4260 set thread context of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 2384 set thread context of 2636 2384 gennt.exe 91 -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4260 wrote to memory of 4992 4260 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 89 PID 4992 wrote to memory of 2384 4992 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 90 PID 4992 wrote to memory of 2384 4992 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 90 PID 4992 wrote to memory of 2384 4992 1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe 90 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2384 wrote to memory of 2636 2384 gennt.exe 91 PID 2636 wrote to memory of 1380 2636 gennt.exe 92 PID 2636 wrote to memory of 1380 2636 gennt.exe 92 PID 2636 wrote to memory of 1380 2636 gennt.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe"C:\Users\Admin\AppData\Local\Temp\1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Users\Admin\AppData\Local\Temp\1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe"{path}"2⤵
- Suspicious use of WriteProcessMemory
PID:4992 -
C:\ProgramData\cfb2287ad52cb75b3e24\gennt.exeC:\ProgramData\cfb2287ad52cb75b3e24\gennt.exe "C:\Users\Admin\AppData\Local\Temp\1c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9.exe" ensgJJ3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\ProgramData\cfb2287ad52cb75b3e24\gennt.exe"{path}"4⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\cfb2287ad52cb75b3e24\gennt.exe5⤵PID:1380
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
144KB
MD537d8bced898bf955130f39645eba3f0a
SHA1c411ffa43ad7cf7bf321017e9a2d7d9bae1f0cf5
SHA2561c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9
SHA5121ae8c515a0a820552c8861fdde197dee0ea0f7fabae74ee4fac9c345f0e1dadf5448b0787cbedfa9e960980419dd3f59fbb8cae8da84df74283348ac80554eaa
-
Filesize
144KB
MD537d8bced898bf955130f39645eba3f0a
SHA1c411ffa43ad7cf7bf321017e9a2d7d9bae1f0cf5
SHA2561c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9
SHA5121ae8c515a0a820552c8861fdde197dee0ea0f7fabae74ee4fac9c345f0e1dadf5448b0787cbedfa9e960980419dd3f59fbb8cae8da84df74283348ac80554eaa
-
Filesize
144KB
MD537d8bced898bf955130f39645eba3f0a
SHA1c411ffa43ad7cf7bf321017e9a2d7d9bae1f0cf5
SHA2561c6852799eabf0c9e744016a3113af6d1185c3de41acdbf90c95297d252d01f9
SHA5121ae8c515a0a820552c8861fdde197dee0ea0f7fabae74ee4fac9c345f0e1dadf5448b0787cbedfa9e960980419dd3f59fbb8cae8da84df74283348ac80554eaa