Overview
overview
7Static
static
3FX20GM/SETUP.exe
windows7-x64
7FX20GM/SETUP.exe
windows10-2004-x64
7FX20GM/SETUP.exe
windows7-x64
7FX20GM/SETUP.exe
windows10-2004-x64
7FX20GM/_ISDEL.exe
windows7-x64
3FX20GM/_ISDEL.exe
windows10-2004-x64
3FX20GM/_ISDEL.exe
windows7-x64
3FX20GM/_ISDEL.exe
windows10-2004-x64
3FX20GM/_SETUP.dll
windows7-x64
3FX20GM/_SETUP.dll
windows10-2004-x64
3FX20GM/lpk.dll
windows7-x64
7FX20GM/lpk.dll
windows10-2004-x64
7Analysis
-
max time kernel
93s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/09/2024, 13:10
Static task
static1
Behavioral task
behavioral1
Sample
FX20GM/SETUP.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
FX20GM/SETUP.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
FX20GM/SETUP.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
FX20GM/SETUP.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
FX20GM/_ISDEL.exe
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
FX20GM/_ISDEL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
FX20GM/_ISDEL.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
FX20GM/_ISDEL.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
FX20GM/_SETUP.dll
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
FX20GM/_SETUP.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
FX20GM/lpk.dll
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
FX20GM/lpk.dll
Resource
win10v2004-20240802-en
General
-
Target
FX20GM/lpk.dll
-
Size
45KB
-
MD5
162f79fe4179ef30d72c5c0bdb55958c
-
SHA1
311a48bab53428b7e04edf252f978672411ec634
-
SHA256
013483068f0a2108099a073933013824ebfce5173c36bf812afa27a2853bd601
-
SHA512
0a71a3358cadb21ac976349d5076ec317634b87455e17d82658a2b5781726bc615bd93779a169e1e9688e6d27a2d47a853417f0276d7528eef91df2e98deace5
-
SSDEEP
768:zojY9Pw68uUCS77GhGLhLpms1RPo9yHHojY9P:Gm46BS7LL18Uo9yHSm
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4788 hrl6169.tmp 2480 skwigk.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\skwigk.exe hrl6169.tmp File opened for modification C:\Windows\SysWOW64\skwigk.exe hrl6169.tmp -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2480 set thread context of 3620 2480 skwigk.exe 88 -
Program crash 1 IoCs
pid pid_target Process procid_target 4004 3620 WerFault.exe 88 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language hrl6169.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language skwigk.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2204 wrote to memory of 4240 2204 rundll32.exe 83 PID 2204 wrote to memory of 4240 2204 rundll32.exe 83 PID 2204 wrote to memory of 4240 2204 rundll32.exe 83 PID 4240 wrote to memory of 4788 4240 rundll32.exe 85 PID 4240 wrote to memory of 4788 4240 rundll32.exe 85 PID 4240 wrote to memory of 4788 4240 rundll32.exe 85 PID 2480 wrote to memory of 3620 2480 skwigk.exe 88 PID 2480 wrote to memory of 3620 2480 skwigk.exe 88 PID 2480 wrote to memory of 3620 2480 skwigk.exe 88 PID 2480 wrote to memory of 3620 2480 skwigk.exe 88 PID 2480 wrote to memory of 3620 2480 skwigk.exe 88
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\FX20GM\lpk.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\FX20GM\lpk.dll,#12⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4240 -
C:\Users\Admin\AppData\Local\Temp\hrl6169.tmpC:\Users\Admin\AppData\Local\Temp\hrl6169.tmp3⤵
- Executes dropped EXE
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
PID:4788
-
-
-
C:\Windows\SysWOW64\skwigk.exeC:\Windows\SysWOW64\skwigk.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\SysWOW64\svchost.exesvchost.exe2⤵PID:3620
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3620 -s 123⤵
- Program crash
PID:4004
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 3620 -ip 36201⤵PID:976
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
38KB
MD57f0d34d040b495d00901ef4d34bd67d4
SHA1d776c1703723dcee77c1ea8a33de6aff9273fe03
SHA256953069a5332c058224df36634c8e887557a0d6e023bb2bbeda32bf054fe63d6f
SHA5128f1da9ef9d3ecf8a319eb0e9568b61b45599be7b8b85f6d5a40783546db5688d5c8e6475a4e3a88088c6be004822d08d5a5a938592bf7a85c77067688b781106