Analysis

  • max time kernel
    98s
  • max time network
    98s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26-08-2024 06:03

General

  • Target

    19405f7736d00f0b061a833dd0ff92e0N.exe

  • Size

    79KB

  • MD5

    19405f7736d00f0b061a833dd0ff92e0

  • SHA1

    14672b911f451db7e91494f18b72e9f5a2134419

  • SHA256

    808d7f007b08df177a480dfafd3cb2f8e69a5c9fd467dc66262616aeefad3b4d

  • SHA512

    a57ed0208c275dd8a5771ad43ca75088f03fd4bfeb3acb55e1f0aaad89e37b3b249903e3e1177eef9ae16114b1211c185687774d4100ade60d9a82c88b48b954

  • SSDEEP

    1536:abSshapMJgKJUuxGmfJPtOgqm1s/XZSWcH5:K25KJFjfJPtOgqm2/XZXg

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\19405f7736d00f0b061a833dd0ff92e0N.exe
    "C:\Users\Admin\AppData\Local\Temp\19405f7736d00f0b061a833dd0ff92e0N.exe"
    1⤵
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2264
    • \??\c:\users\admin\appdata\local\temp\winlgon.exe
      c:\users\admin\appdata\local\temp\winlgon.exe
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      PID:3696
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3696 -s 688
        3⤵
        • Program crash
        PID:1568
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2264 -s 556
      2⤵
      • Program crash
      PID:4232
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3696 -ip 3696
    1⤵
      PID:3192
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 184 -p 2264 -ip 2264
      1⤵
        PID:2136

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • \??\c:\users\admin\appdata\local\temp\winlgon.exe

        Filesize

        79KB

        MD5

        d79eb8d2bd1a35c0867bc0e6fe9d4e63

        SHA1

        91250d4f4aaa68571d5760afa5b1419d242ea917

        SHA256

        ca6dd57c356f2072cfb64ec1bbbe8eda0bdfef5815fb5efe6a4242360b957b77

        SHA512

        0321bcd288ef518ca66929d2c19d7291788785bf0740d1f0d68504b199ef01e9290734794dfdeace7fc093b1a3f991ead282ce26fac4ff952740cdf36c85a39a