Analysis
-
max time kernel
121s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
01-05-2024 04:15
Static task
static1
Behavioral task
behavioral1
Sample
e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe
Resource
win10v2004-20240419-en
General
-
Target
e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe
-
Size
76KB
-
MD5
9dd87d7e39d9133abaf02aa1def29a47
-
SHA1
8f9aad08a555ed87f9d8dd90e944515e20fca8f2
-
SHA256
e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3
-
SHA512
4f6c6ba553c2eb8310183edbc2bf2944045986ca78469f2d39683a6acd35bb3f6f078f69e3f3d8027b433e7cd93d6d691dab931797b0a5494ba701c4b4ca8c12
-
SSDEEP
1536:abSshapMJgKJUuxGmfJPtOgqm1s/XZSWcHFL:K25KJFjfJPtOgqm2/XZXc
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2924 winlgon.exe -
Loads dropped DLL 9 IoCs
pid Process 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe 2656 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe Set value (str) \REGISTRY\USER\S-1-5-21-3627615824-4061627003-3019543961-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2656 2924 WerFault.exe 28 2704 1248 WerFault.exe 27 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 2924 winlgon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1248 wrote to memory of 2924 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 28 PID 1248 wrote to memory of 2924 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 28 PID 1248 wrote to memory of 2924 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 28 PID 1248 wrote to memory of 2924 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 28 PID 2924 wrote to memory of 2656 2924 winlgon.exe 29 PID 2924 wrote to memory of 2656 2924 winlgon.exe 29 PID 2924 wrote to memory of 2656 2924 winlgon.exe 29 PID 2924 wrote to memory of 2656 2924 winlgon.exe 29 PID 1248 wrote to memory of 2704 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 32 PID 1248 wrote to memory of 2704 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 32 PID 1248 wrote to memory of 2704 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 32 PID 1248 wrote to memory of 2704 1248 e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe"C:\Users\Admin\AppData\Local\Temp\e056fa4f27f1048f168c3326956b0da99a340c4763ec672e456e50a8366a8fa3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1248 -
\??\c:\users\admin\appdata\local\temp\winlgon.exec:\users\admin\appdata\local\temp\winlgon.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1248 -s 2042⤵
- Program crash
PID:2704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
76KB
MD5dec694e4cad55681987a9a8aaeb626af
SHA1032766fcb4409f8ed2c76862e963daff37434a16
SHA25699aa63593ff301cb170791b605b153b40abe5e74683cfb7bcc656b8b5f1a9ea3
SHA5126e7c2aee95acecbc714b625fac42a8d0a79f426da5dc9993e9335a63a797e02a3fd8aee84cb12b1c8361ad00ff198ed1e1c4d60c4b1ceffa0585eb62ec0e4657