Analysis
-
max time kernel
67s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
15/02/2023, 18:43
Static task
static1
Behavioral task
behavioral1
Sample
9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe
Resource
win10v2004-20220812-en
General
-
Target
9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe
-
Size
124KB
-
MD5
57f8c861415c8340a34290b2c3b169d2
-
SHA1
2c71ba918791a1d23276d22a9e11b0685284a22d
-
SHA256
9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50
-
SHA512
a7efd1f26bb25bd7c25a4a90f7387871135aaaa4231c5d0ad7a0089a0bc3a87f504e62293b44095d148f63ef4165fa224c211cdff4cbc6e63c59f43cbab48cd9
-
SSDEEP
3072:fhCInyerIJDDZxeeNp3PC2wnwVLkJVllWbDW:fhCInyecdD7eyCznLTllWb6
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1168 rwnlws.exe 4132 rwnlws.exe -
Creates a Windows Service
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\rwnlws.exe 9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe File created C:\Windows\rwnlws.exe 9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 rwnlws.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz rwnlws.exe -
Modifies data under HKEY_USERS 5 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft rwnlws.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie rwnlws.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum\Version = "7" rwnlws.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum rwnlws.exe Key created \REGISTRY\USER\.DEFAULT\Software rwnlws.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe 4132 rwnlws.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4636 9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4636 9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe 1168 rwnlws.exe 4132 rwnlws.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1168 wrote to memory of 4132 1168 rwnlws.exe 81 PID 1168 wrote to memory of 4132 1168 rwnlws.exe 81 PID 1168 wrote to memory of 4132 1168 rwnlws.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe"C:\Users\Admin\AppData\Local\Temp\9fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:4636
-
C:\Windows\rwnlws.exeC:\Windows\rwnlws.exe1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1168 -
C:\Windows\rwnlws.exeC:\Windows\rwnlws.exe Win72⤵
- Executes dropped EXE
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4132
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD557f8c861415c8340a34290b2c3b169d2
SHA12c71ba918791a1d23276d22a9e11b0685284a22d
SHA2569fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50
SHA512a7efd1f26bb25bd7c25a4a90f7387871135aaaa4231c5d0ad7a0089a0bc3a87f504e62293b44095d148f63ef4165fa224c211cdff4cbc6e63c59f43cbab48cd9
-
Filesize
124KB
MD557f8c861415c8340a34290b2c3b169d2
SHA12c71ba918791a1d23276d22a9e11b0685284a22d
SHA2569fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50
SHA512a7efd1f26bb25bd7c25a4a90f7387871135aaaa4231c5d0ad7a0089a0bc3a87f504e62293b44095d148f63ef4165fa224c211cdff4cbc6e63c59f43cbab48cd9
-
Filesize
124KB
MD557f8c861415c8340a34290b2c3b169d2
SHA12c71ba918791a1d23276d22a9e11b0685284a22d
SHA2569fa70ac11eab9f3e1578c8239e561088e11efae2543cb327738fad35fdfb6f50
SHA512a7efd1f26bb25bd7c25a4a90f7387871135aaaa4231c5d0ad7a0089a0bc3a87f504e62293b44095d148f63ef4165fa224c211cdff4cbc6e63c59f43cbab48cd9