Analysis
-
max time kernel
44s -
max time network
54s -
platform
windows11-21h2_x64 -
resource
win11-20240419-en -
resource tags
arch:x64arch:x86image:win11-20240419-enlocale:en-usos:windows11-21h2-x64system -
submitted
26-04-2024 23:58
Static task
static1
Behavioral task
behavioral1
Sample
Seroxen.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
Seroxen.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral3
Sample
Seroxen.exe
Resource
win11-20240419-en
General
-
Target
Seroxen.exe
-
Size
12KB
-
MD5
8208ea3955533b799b0f5f65db02df8a
-
SHA1
8829745dd294bb94d1dc39266cb2b8c2457b00cd
-
SHA256
0663f1114eca93d267e0ae9ddbaacf05974d77c0fa95efdf22f23ecbdf8e38cb
-
SHA512
f9d17761a044ec89490c7727a4cd365f950dd4e5f56762363ea8441fed2a6552036aafc8804fdddf87488148d2e94052e8f94c11dcc36e77d8d047baaf97448a
-
SSDEEP
192:+3s2rvMWWwghZv1Bsl0csO9qqjKw65dKUmP+eBQ8JG0x/kPo:as27M/zhZNyWjO9H65dDmPVQKdkw
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3552 4732 WerFault.exe Seroxen.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Modifies registry class 7 IoCs
Processes:
reg.exereg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings\shell\open\command reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings\shell\open\command\DelegateExecute = "0" reg.exe Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings\shell\open\command reg.exe Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings reg.exe Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings\shell reg.exe Key created \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings\shell\open reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2878097196-921257239-309638238-1000_Classes\ms-settings\shell\open\command\ = "wscript.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\applejack1448147.vbs" reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Seroxen.exedescription pid process Token: SeDebugPrivilege 4732 Seroxen.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
Seroxen.execmd.exeComputerDefaults.exewscript.execmd.exedescription pid process target process PID 4732 wrote to memory of 2796 4732 Seroxen.exe reg.exe PID 4732 wrote to memory of 2796 4732 Seroxen.exe reg.exe PID 4732 wrote to memory of 2796 4732 Seroxen.exe reg.exe PID 4732 wrote to memory of 1220 4732 Seroxen.exe reg.exe PID 4732 wrote to memory of 1220 4732 Seroxen.exe reg.exe PID 4732 wrote to memory of 1220 4732 Seroxen.exe reg.exe PID 4732 wrote to memory of 2888 4732 Seroxen.exe cmd.exe PID 4732 wrote to memory of 2888 4732 Seroxen.exe cmd.exe PID 4732 wrote to memory of 2888 4732 Seroxen.exe cmd.exe PID 2888 wrote to memory of 1432 2888 cmd.exe ComputerDefaults.exe PID 2888 wrote to memory of 1432 2888 cmd.exe ComputerDefaults.exe PID 2888 wrote to memory of 1432 2888 cmd.exe ComputerDefaults.exe PID 1432 wrote to memory of 1632 1432 ComputerDefaults.exe wscript.exe PID 1432 wrote to memory of 1632 1432 ComputerDefaults.exe wscript.exe PID 1432 wrote to memory of 1632 1432 ComputerDefaults.exe wscript.exe PID 1632 wrote to memory of 3788 1632 wscript.exe cmd.exe PID 1632 wrote to memory of 3788 1632 wscript.exe cmd.exe PID 1632 wrote to memory of 3788 1632 wscript.exe cmd.exe PID 4732 wrote to memory of 5112 4732 Seroxen.exe cmd.exe PID 4732 wrote to memory of 5112 4732 Seroxen.exe cmd.exe PID 4732 wrote to memory of 5112 4732 Seroxen.exe cmd.exe PID 5112 wrote to memory of 4632 5112 cmd.exe schtasks.exe PID 5112 wrote to memory of 4632 5112 cmd.exe schtasks.exe PID 5112 wrote to memory of 4632 5112 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Seroxen.exe"C:\Users\Admin\AppData\Local\Temp\Seroxen.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /d "wscript.exe C:\Users\Admin\AppData\Local\Temp\applejack1448147.vbs" /f2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\system32\reg.exe" add "HKCU\Software\Classes\ms-settings\shell\open\command" /v DelegateExecute /d "0" /f2⤵
- Modifies registry class
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C computerdefaults.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\ComputerDefaults.execomputerdefaults.exe3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exe"wscript.exe" C:\Users\Admin\AppData\Local\Temp\applejack1448147.vbs4⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C del C:\Windows\System32\drivers\etc\hosts5⤵
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /C schtasks /Create /SC ONLOGON /TN FoxitReaderUpdater_FGHgbhnJDeyD1gGgf050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\InputPersonalization\FGHgbhnJDeyD1gGgf050MX.exe" /RL HIGHEST /IT2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /SC ONLOGON /TN FoxitReaderUpdater_FGHgbhnJDeyD1gGgf050MX /TR "C:\Users\Admin\AppData\Local\Microsoft\InputPersonalization\FGHgbhnJDeyD1gGgf050MX.exe" /RL HIGHEST /IT3⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4732 -s 17362⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4732 -ip 47321⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\applejack1448147.vbsFilesize
171B
MD5a34267102c21aff46aecc85598924544
SHA177268af47c6a4b9c6be7f7487b2c9b233d49d435
SHA256eba7ab5c248e46dbe70470b41ebf25a378b4eff9ce632adff927ac1f95583d44
SHA5125d320312b93b46c9051a20c82d6405a3f2c78b23adb3ab3e71aad854b65b500937de7ca2986cf79967386d689beecccf676d89afde8ecc5d5ad0cb4ae2bf38a3
-
memory/4732-0-0x00000000002E0000-0x00000000002EC000-memory.dmpFilesize
48KB
-
memory/4732-1-0x0000000005500000-0x000000000551A000-memory.dmpFilesize
104KB
-
memory/4732-2-0x0000000074740000-0x0000000074EF1000-memory.dmpFilesize
7.7MB
-
memory/4732-3-0x0000000005680000-0x0000000005690000-memory.dmpFilesize
64KB
-
memory/4732-4-0x0000000002F00000-0x0000000002F0A000-memory.dmpFilesize
40KB
-
memory/4732-5-0x00000000055E0000-0x0000000005672000-memory.dmpFilesize
584KB
-
memory/4732-6-0x0000000005C40000-0x00000000061E6000-memory.dmpFilesize
5.6MB
-
memory/4732-9-0x0000000074740000-0x0000000074EF1000-memory.dmpFilesize
7.7MB
-
memory/4732-10-0x0000000005680000-0x0000000005690000-memory.dmpFilesize
64KB
-
memory/4732-11-0x0000000074740000-0x0000000074EF1000-memory.dmpFilesize
7.7MB