Analysis
-
max time kernel
110s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
29-08-2024 13:49
Static task
static1
Behavioral task
behavioral1
Sample
request.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
request.exe
Resource
win10v2004-20240802-en
General
-
Target
request.exe
-
Size
307KB
-
MD5
ef8320eace6f753231666c61104bdd49
-
SHA1
0166aceb79a7d6b4a041fd7595fc1d75404a4419
-
SHA256
8e2fa428fa5e7092d117dadf10529a35f415a0b8fa27cd17607e23dd913ffcdc
-
SHA512
354676c97fe1666920a75fdbffecfd0ac802613572b9e7d0dbc9a1ac24b3c771ca8fa3c1f3375f0a1c90364a07fa22469d2e7eb822196c0a2a1893931b62efe9
-
SSDEEP
6144:hh9fH2l34HigA2/BDBaBL7cpnBZVCBQrfYQSlyItcJ2+QmmaeIBqk3biuFo480AL:s9jtaeIBqmu
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 1236 msvcservice.exe 2764 msvcservice.exe 2192 msvcservice.exe -
Loads dropped DLL 6 IoCs
pid Process 1736 request.exe 1736 request.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe 2800 WerFault.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" request.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe Set value (str) \REGISTRY\USER\S-1-5-21-2172136094-3310281978-782691160-1000\Software\Microsoft\Windows\CurrentVersion\Run\msvcservice = "C:\\Users\\Admin\\msvcservice.exe" msvcservice.exe -
Looks up external IP address via web service 3 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.io 6 ip-api.io 2 ip-api.io -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2800 1236 WerFault.exe 32 -
System Location Discovery: System Language Discovery 1 TTPs 8 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language request.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language msvcservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 4 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1596 schtasks.exe 1228 schtasks.exe 2812 schtasks.exe 828 schtasks.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1596 1736 request.exe 30 PID 1736 wrote to memory of 1596 1736 request.exe 30 PID 1736 wrote to memory of 1596 1736 request.exe 30 PID 1736 wrote to memory of 1596 1736 request.exe 30 PID 1736 wrote to memory of 1236 1736 request.exe 32 PID 1736 wrote to memory of 1236 1736 request.exe 32 PID 1736 wrote to memory of 1236 1736 request.exe 32 PID 1736 wrote to memory of 1236 1736 request.exe 32 PID 1236 wrote to memory of 1228 1236 msvcservice.exe 33 PID 1236 wrote to memory of 1228 1236 msvcservice.exe 33 PID 1236 wrote to memory of 1228 1236 msvcservice.exe 33 PID 1236 wrote to memory of 1228 1236 msvcservice.exe 33 PID 1236 wrote to memory of 2800 1236 msvcservice.exe 36 PID 1236 wrote to memory of 2800 1236 msvcservice.exe 36 PID 1236 wrote to memory of 2800 1236 msvcservice.exe 36 PID 1236 wrote to memory of 2800 1236 msvcservice.exe 36 PID 2104 wrote to memory of 2764 2104 taskeng.exe 38 PID 2104 wrote to memory of 2764 2104 taskeng.exe 38 PID 2104 wrote to memory of 2764 2104 taskeng.exe 38 PID 2104 wrote to memory of 2764 2104 taskeng.exe 38 PID 2764 wrote to memory of 2812 2764 msvcservice.exe 39 PID 2764 wrote to memory of 2812 2764 msvcservice.exe 39 PID 2764 wrote to memory of 2812 2764 msvcservice.exe 39 PID 2764 wrote to memory of 2812 2764 msvcservice.exe 39 PID 2104 wrote to memory of 2192 2104 taskeng.exe 41 PID 2104 wrote to memory of 2192 2104 taskeng.exe 41 PID 2104 wrote to memory of 2192 2104 taskeng.exe 41 PID 2104 wrote to memory of 2192 2104 taskeng.exe 41 PID 2192 wrote to memory of 828 2192 msvcservice.exe 42 PID 2192 wrote to memory of 828 2192 msvcservice.exe 42 PID 2192 wrote to memory of 828 2192 msvcservice.exe 42 PID 2192 wrote to memory of 828 2192 msvcservice.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\request.exe"C:\Users\Admin\AppData\Local\Temp\request.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1596
-
-
C:\Users\Admin\msvcservice.exe"C:\Users\Admin\msvcservice.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:1228
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 5923⤵
- Loads dropped DLL
- Program crash
PID:2800
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {9388F08D-F9FF-48A2-AF85-523BC3E3814F} S-1-5-21-2172136094-3310281978-782691160-1000:EXCFTDUU\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2104 -
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2812
-
-
-
C:\Users\Admin\msvcservice.exeC:\Users\Admin\msvcservice.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\schtasks.exeC:\Windows\System32\schtasks.exe /Create /SC MINUTE /MO 1 /TN msvcservice /TR "C:\Users\Admin\msvcservice.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:828
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Privilege Escalation
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
307KB
MD5ef8320eace6f753231666c61104bdd49
SHA10166aceb79a7d6b4a041fd7595fc1d75404a4419
SHA2568e2fa428fa5e7092d117dadf10529a35f415a0b8fa27cd17607e23dd913ffcdc
SHA512354676c97fe1666920a75fdbffecfd0ac802613572b9e7d0dbc9a1ac24b3c771ca8fa3c1f3375f0a1c90364a07fa22469d2e7eb822196c0a2a1893931b62efe9