Analysis
-
max time kernel
106s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
15-09-2024 08:53
Static task
static1
Behavioral task
behavioral1
Sample
5bb09cbd5c808306bb11b116d31275b0N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5bb09cbd5c808306bb11b116d31275b0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5bb09cbd5c808306bb11b116d31275b0N.exe
-
Size
78KB
-
MD5
5bb09cbd5c808306bb11b116d31275b0
-
SHA1
872b8cc2e62d22c3aa8f3bf27e21316a18717edc
-
SHA256
7b3581e00e5a8fb75665517442c73ea77625516e97f9b3185dd95dfc695c48b2
-
SHA512
6594465fc7fe0c1e37542311601d038433f31b496daed48949a931cabbe7a9f967dc5f6a25a882afc24bfd39e13e7cc644d50a4bd10cf97734791585189f4b95
-
SSDEEP
1536:kP6RJLbSshapMJgK+hxaZUux1imfJPtOrqm1s/XZydNbM:06RJz25KnZFvVfJPtOrqm2/XZuC
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2952 winlgon.exe -
Loads dropped DLL 2 IoCs
pid Process 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 1428 5bb09cbd5c808306bb11b116d31275b0N.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 5bb09cbd5c808306bb11b116d31275b0N.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 5bb09cbd5c808306bb11b116d31275b0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2212 1428 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlgon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5bb09cbd5c808306bb11b116d31275b0N.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 2952 winlgon.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1428 wrote to memory of 2952 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 30 PID 1428 wrote to memory of 2952 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 30 PID 1428 wrote to memory of 2952 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 30 PID 1428 wrote to memory of 2952 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 30 PID 1428 wrote to memory of 2212 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 31 PID 1428 wrote to memory of 2212 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 31 PID 1428 wrote to memory of 2212 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 31 PID 1428 wrote to memory of 2212 1428 5bb09cbd5c808306bb11b116d31275b0N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5bb09cbd5c808306bb11b116d31275b0N.exe"C:\Users\Admin\AppData\Local\Temp\5bb09cbd5c808306bb11b116d31275b0N.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1428 -
\??\c:\users\admin\appdata\local\temp\winlgon.exec:\users\admin\appdata\local\temp\winlgon.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2952
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1428 -s 2042⤵
- Program crash
PID:2212
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD57674277b76fd0b0994c1bae00ecaf5fe
SHA1b1aec6fc2a804a2f7b12958c00c37248f82eff75
SHA2565dccffc1d573f7ecfadb818526384b3113c0db462b5ade9273eca061e64bd2a5
SHA512877d030997f2abfb60b23fb3657541eecd1fcd86701bb0c8be3254d6df368907609af0419cbea60e9b302eb2dce7bff2780092581f9b5c61afd7df77819718d4