Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 23:23
Static task
static1
Behavioral task
behavioral1
Sample
1fe2c5a7121acc1e42dfa3fb67eaac8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1fe2c5a7121acc1e42dfa3fb67eaac8b.exe
Resource
win10v2004-20231222-en
General
-
Target
1fe2c5a7121acc1e42dfa3fb67eaac8b.exe
-
Size
135KB
-
MD5
1fe2c5a7121acc1e42dfa3fb67eaac8b
-
SHA1
afd8d01c6f3d434006e698c0910452db022cb980
-
SHA256
080e57d9589bd4bafab6185f089798b6a7f71117d7a6cda1ba3912c16d2e68a5
-
SHA512
7f0236c414909342a9a9c5e2daeab49a280f80a0c7565cb02c9c50e07b534a57031d92df0bb3c5cc59ebad76b27666ac3c1804dfc4babdb62c6373ada68149ae
-
SSDEEP
3072:LgXdZt9P6D3XJ5mhey9tke1o26qKxc9ZC+Ej2Fni+1si:Le34eeetke1o2Y4YqSi
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3144 wletins.exe -
Loads dropped DLL 1 IoCs
pid Process 4348 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windowlet = "C:\\Program Files (x86)\\Windowlet\\windowlet.exe" wletins.exe -
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Drops file in Program Files directory 6 IoCs
description ioc Process File created C:\Program Files (x86)\Windowlet\Windowlets.dll 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe File created C:\Program Files (x86)\Windowlet\Windowlet.exe 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe File created C:\Program Files (x86)\Windowlet\Uninstall.exe 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe File created C:\Program Files (x86)\Windowlet\Windowset.exe 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe File created C:\Program Files (x86)\Windowlet\wletins.exe 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe File opened for modification C:\Program Files (x86)\Windowlet\wletdo.ini wletins.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3144 wletins.exe 3144 wletins.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4348 wrote to memory of 3144 4348 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe 20 PID 4348 wrote to memory of 3144 4348 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe 20 PID 4348 wrote to memory of 3144 4348 1fe2c5a7121acc1e42dfa3fb67eaac8b.exe 20
Processes
-
C:\Users\Admin\AppData\Local\Temp\1fe2c5a7121acc1e42dfa3fb67eaac8b.exe"C:\Users\Admin\AppData\Local\Temp\1fe2c5a7121acc1e42dfa3fb67eaac8b.exe"1⤵
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:4348 -
C:\Program Files (x86)\Windowlet\wletins.exe"C:\Program Files (x86)\Windowlet\wletins.exe" C:\Users\Admin\AppData\Local\Temp\1fe2c5a7121acc1e42dfa3fb67eaac8b.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of SetWindowsHookEx
PID:3144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
42KB
MD506eadcee6bac62610c7156bbcc0c21e6
SHA1add010da57e22cf292b534a864908277e49dd2dc
SHA256034d48e5b49f54e90a468860301ea14880d1c97ea79f138c054a8c50c37e0e8e
SHA51269088d2f8adff9fcfe0e2123d51f92c019816ff9bb945b528a7bf695474cc705cfc7e0805a85889d761962aae685309f95404e662d65a0eb072f7ffdc7c07fa5
-
Filesize
11KB
MD500a0194c20ee912257df53bfe258ee4a
SHA1d7b4e319bc5119024690dc8230b9cc919b1b86b2
SHA256dc4da2ccadb11099076926b02764b2b44ad8f97cd32337421a4cc21a3f5448f3
SHA5123b38a2c17996c3b77ebf7b858a6c37415615e756792132878d8eddbd13cb06710b7da0e8b58104768f8e475fc93e8b44b3b1ab6f70ddf52edee111aaf5ef5667