Analysis
-
max time kernel
94s -
max time network
95s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
11/09/2024, 12:15
Static task
static1
Behavioral task
behavioral1
Sample
cf666233d93014f57c0819d441681b10N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
cf666233d93014f57c0819d441681b10N.exe
Resource
win10v2004-20240802-en
General
-
Target
cf666233d93014f57c0819d441681b10N.exe
-
Size
5KB
-
MD5
cf666233d93014f57c0819d441681b10
-
SHA1
4da917d93bd9a3ed25ef255d015381ec95521ade
-
SHA256
d2d093958031e8fe72d9608eb3cc589252158758f1b8c56e0ddbe6ddc59a37d2
-
SHA512
a09a9afd41f881ada0ecad1a216a7d76b9e89bd857d96d1a85b8ed68630d35d81dfc1c545640c4a6357cba0f02a6551c083901308b935b352192b9ca93eb064a
-
SSDEEP
96:1TdDlgcNhFxW/7n01fLfVvNzVNgfpJMC9prpwy12vkWnliu2NkzLUssCFzs608l:1TQcNhCefrVvNz9CTr312vkWl92NGosf
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\Tasks\\conime.exe" cf666233d93014f57c0819d441681b10N.exe -
Executes dropped EXE 1 IoCs
pid Process 1896 conime.exe -
Indicator Removal: File Deletion 1 TTPs
Adversaries may delete files left behind by the actions of their intrusion activity.
-
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Tasks\conime.exe cf666233d93014f57c0819d441681b10N.exe File created C:\Windows\Tasks\conime.exe cf666233d93014f57c0819d441681b10N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3704 1896 WerFault.exe 93 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cf666233d93014f57c0819d441681b10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language conime.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2172 wrote to memory of 1896 2172 cf666233d93014f57c0819d441681b10N.exe 93 PID 2172 wrote to memory of 1896 2172 cf666233d93014f57c0819d441681b10N.exe 93 PID 2172 wrote to memory of 1896 2172 cf666233d93014f57c0819d441681b10N.exe 93 PID 2172 wrote to memory of 2628 2172 cf666233d93014f57c0819d441681b10N.exe 96 PID 2172 wrote to memory of 2628 2172 cf666233d93014f57c0819d441681b10N.exe 96 PID 2172 wrote to memory of 2628 2172 cf666233d93014f57c0819d441681b10N.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\cf666233d93014f57c0819d441681b10N.exe"C:\Users\Admin\AppData\Local\Temp\cf666233d93014f57c0819d441681b10N.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\Tasks\conime.exeC:\Windows\Tasks\conime.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:1896 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1896 -s 12763⤵
- Program crash
PID:3704
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c del "C:\Users\Admin\AppData\Local\Temp\cf666233d93014f57c0819d441681b10N.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2628
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 416 -p 1896 -ip 18961⤵PID:4064
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD5cf666233d93014f57c0819d441681b10
SHA14da917d93bd9a3ed25ef255d015381ec95521ade
SHA256d2d093958031e8fe72d9608eb3cc589252158758f1b8c56e0ddbe6ddc59a37d2
SHA512a09a9afd41f881ada0ecad1a216a7d76b9e89bd857d96d1a85b8ed68630d35d81dfc1c545640c4a6357cba0f02a6551c083901308b935b352192b9ca93eb064a