Analysis
-
max time kernel
1s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:07
Static task
static1
Behavioral task
behavioral1
Sample
25c2cb4f8d5065c286d0b9592d9e87c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
25c2cb4f8d5065c286d0b9592d9e87c3.exe
Resource
win10v2004-20231222-en
General
-
Target
25c2cb4f8d5065c286d0b9592d9e87c3.exe
-
Size
31KB
-
MD5
25c2cb4f8d5065c286d0b9592d9e87c3
-
SHA1
0a661db38fb68a4c5f34e906f0abae9f534fa1bd
-
SHA256
013bf1d566645964f4dc1cfd31d16badad06dffeb0c2aece57f6a7066e02776b
-
SHA512
dc8571a5410a9a2cf2354122a12486df43fe85c5a4be23e7290687b7acefbec28c2cb3c9b44ecfff95357e1768436ce96f1e3ac6812129f936d69c71d1653593
-
SSDEEP
384:sy1/LoKfNC/gOlkikHX9Pzf8Xk1X4ViA+oo//xxjAaPnc9+TOQVswSk9uQbjth7m:sj/g8gHCXk1Xb7CxeswN9gx
Malware Config
Signatures
-
Adds autorun key to be loaded by Explorer.exe on startup 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad 25c2cb4f8d5065c286d0b9592d9e87c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\ShellServiceObjectDelayLoad\LGootkitSSO = "{2CB70408-1E80-4B7B-BD8F-0485F0BBF01E}" 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Loads dropped DLL 2 IoCs
pid Process 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 4000 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\lmsxsltsso.dll 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 3320 set thread context of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 1852 3320 WerFault.exe 14 -
Modifies registry class 5 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB70408-1E80-4B7B-BD8F-0485F0BBF01E}\InProcServer32 25c2cb4f8d5065c286d0b9592d9e87c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node 25c2cb4f8d5065c286d0b9592d9e87c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID 25c2cb4f8d5065c286d0b9592d9e87c3.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB70408-1E80-4B7B-BD8F-0485F0BBF01E} 25c2cb4f8d5065c286d0b9592d9e87c3.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{2CB70408-1E80-4B7B-BD8F-0485F0BBF01E}\InProcServer32\ = "C:\\Windows\\SysWow64\\lmsxsltsso.dll" 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 3320 wrote to memory of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 PID 3320 wrote to memory of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 PID 3320 wrote to memory of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 PID 3320 wrote to memory of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 PID 3320 wrote to memory of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 PID 3320 wrote to memory of 1692 3320 25c2cb4f8d5065c286d0b9592d9e87c3.exe 32 PID 1692 wrote to memory of 4000 1692 25c2cb4f8d5065c286d0b9592d9e87c3.exe 31 PID 1692 wrote to memory of 4000 1692 25c2cb4f8d5065c286d0b9592d9e87c3.exe 31 PID 1692 wrote to memory of 4000 1692 25c2cb4f8d5065c286d0b9592d9e87c3.exe 31 PID 1692 wrote to memory of 4000 1692 25c2cb4f8d5065c286d0b9592d9e87c3.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3320 -s 5882⤵
- Program crash
PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"C:\Users\Admin\AppData\Local\Temp\25c2cb4f8d5065c286d0b9592d9e87c3.exe"2⤵
- Adds autorun key to be loaded by Explorer.exe on startup
- Drops file in System32 directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:1692
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3320 -ip 33201⤵PID:4212
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del "C:\Users\Admin\AppData\Local\Temp\25C2CB~1.EXE" >> NUL1⤵PID:64
-
C:\Windows\SysWOW64\svchost.exesvchost.exe1⤵
- Loads dropped DLL
PID:4000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD5e75ffa0a49768c956a7c76cdaff3b14b
SHA1a2ae05a4f60569035f84d159364d6d808e3e51f4
SHA25609df071b29964f33febc9669a6a03e923f928d9f60131f4b09e6fd33ee32e4da
SHA512b13fe2933fab5fe7372ec5b6e3c95f639f7d4f0f6d1fb13be78837e524e691a37095b1702aad240d3c46335daa28f683d1bf6997fb9503faac9c25bf9a049f49
-
Filesize
1KB
MD50b63edbafaee7fc2a461025a73d7edcd
SHA111863dfa15f5cb29481b367d2169200b8d384423
SHA2564f4d267d71960b207736658154294a82570f910195993e65dc81bb217fd0faa3
SHA51220e1a54cae1dfc8b211f18d09d252d232b016333402abb202a24e8da6f1960250718c58cae22b3a5a5228bf668399cae3fa96774a29fa2dfdd2dca23599e4f01