Analysis
-
max time kernel
146s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
06/03/2024, 16:22
Static task
static1
Behavioral task
behavioral1
Sample
b7d7d55c964c6888fb6120719202fb1d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b7d7d55c964c6888fb6120719202fb1d.exe
Resource
win10v2004-20240226-en
General
-
Target
b7d7d55c964c6888fb6120719202fb1d.exe
-
Size
451KB
-
MD5
b7d7d55c964c6888fb6120719202fb1d
-
SHA1
a513bc72ef573ce215b436fd1ef71a27eab0d226
-
SHA256
42e183f61735868b10c3a4b128496d2f51fb49458dc49715dde5dfda82828a3c
-
SHA512
a229428dcddb6cfc126b7f4db42079e8fc22f05b1502444708d660a36da79da76a819bfebcd3c757f1e24dbe02d98535836378e53e938c3d4f8811e45c48cec7
-
SSDEEP
1536:hO20qHkRRNpTNJo9KJt7i3ukMV111I8Yp45wzvShJFIn8lq93oFDeUXtk3ns:hMRjVo9uFiJu11upaEMq8Y3Utm
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2727153400-192325109-1870347593-1000\Control Panel\International\Geo\Nation b7d7d55c964c6888fb6120719202fb1d.exe -
Executes dropped EXE 7 IoCs
pid Process 3304 winlogon.exe 3912 winlogon.exe 5016 winlogon.exe 1832 winlogon.exe 2328 winlogon.exe 3760 winlogon.exe 2452 winlogon.exe -
resource yara_rule behavioral2/memory/748-0-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/748-3-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/748-4-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/748-15-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-28-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-34-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-40-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-46-0x0000000000400000-0x000000000041C000-memory.dmp upx behavioral2/memory/3912-52-0x0000000000400000-0x000000000041C000-memory.dmp upx -
Suspicious use of SetThreadContext 7 IoCs
description pid Process procid_target PID 1516 set thread context of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 3304 set thread context of 3912 3304 winlogon.exe 93 PID 3912 set thread context of 5016 3912 winlogon.exe 96 PID 3912 set thread context of 1832 3912 winlogon.exe 108 PID 3912 set thread context of 2328 3912 winlogon.exe 118 PID 3912 set thread context of 3760 3912 winlogon.exe 122 PID 3912 set thread context of 2452 3912 winlogon.exe 125 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 5 IoCs
pid pid_target Process procid_target 704 5016 WerFault.exe 96 416 1832 WerFault.exe 108 4384 2328 WerFault.exe 118 1544 3760 WerFault.exe 122 1520 2452 WerFault.exe 125 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 748 b7d7d55c964c6888fb6120719202fb1d.exe 3912 winlogon.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1516 wrote to memory of 2112 1516 b7d7d55c964c6888fb6120719202fb1d.exe 87 PID 1516 wrote to memory of 2112 1516 b7d7d55c964c6888fb6120719202fb1d.exe 87 PID 1516 wrote to memory of 2112 1516 b7d7d55c964c6888fb6120719202fb1d.exe 87 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 1516 wrote to memory of 748 1516 b7d7d55c964c6888fb6120719202fb1d.exe 88 PID 748 wrote to memory of 3304 748 b7d7d55c964c6888fb6120719202fb1d.exe 91 PID 748 wrote to memory of 3304 748 b7d7d55c964c6888fb6120719202fb1d.exe 91 PID 748 wrote to memory of 3304 748 b7d7d55c964c6888fb6120719202fb1d.exe 91 PID 3304 wrote to memory of 1400 3304 winlogon.exe 92 PID 3304 wrote to memory of 1400 3304 winlogon.exe 92 PID 3304 wrote to memory of 1400 3304 winlogon.exe 92 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3304 wrote to memory of 3912 3304 winlogon.exe 93 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 5016 3912 winlogon.exe 96 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 1832 3912 winlogon.exe 108 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 2328 3912 winlogon.exe 118 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 3760 3912 winlogon.exe 122 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125 PID 3912 wrote to memory of 2452 3912 winlogon.exe 125
Processes
-
C:\Users\Admin\AppData\Local\Temp\b7d7d55c964c6888fb6120719202fb1d.exe"C:\Users\Admin\AppData\Local\Temp\b7d7d55c964c6888fb6120719202fb1d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe2⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\b7d7d55c964c6888fb6120719202fb1d.exe
- Checks computer location settings
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3304 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\system32\\svchost.exe4⤵PID:1400
-
-
C:\Users\Admin\E696D64614\winlogon.exe
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:5016 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5016 -s 126⤵
- Program crash
PID:704
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:1832 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 126⤵
- Program crash
PID:416
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2328 -s 126⤵
- Program crash
PID:4384
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:3760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3760 -s 126⤵
- Program crash
PID:1544
-
-
-
C:\Users\Admin\E696D64614\winlogon.exe"C:\Users\Admin\E696D64614\winlogon.exe"5⤵
- Executes dropped EXE
PID:2452 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 126⤵
- Program crash
PID:1520
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 5016 -ip 50161⤵PID:2292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 1832 -ip 18321⤵PID:2112
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 532 -p 2328 -ip 23281⤵PID:1680
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 540 -p 3760 -ip 37601⤵PID:2696
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 484 -p 2452 -ip 24521⤵PID:3612
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
451KB
MD5b7d7d55c964c6888fb6120719202fb1d
SHA1a513bc72ef573ce215b436fd1ef71a27eab0d226
SHA25642e183f61735868b10c3a4b128496d2f51fb49458dc49715dde5dfda82828a3c
SHA512a229428dcddb6cfc126b7f4db42079e8fc22f05b1502444708d660a36da79da76a819bfebcd3c757f1e24dbe02d98535836378e53e938c3d4f8811e45c48cec7