Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
19-09-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe
Resource
win10v2004-20240802-en
General
-
Target
edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe
-
Size
81KB
-
MD5
5fb65864aa81e256ee4a50cefdf2d086
-
SHA1
48ec49aa41839205e8bef59d235266093be2d276
-
SHA256
edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3
-
SHA512
8b098dfe5e1dcfeb0378c9cb026e5b1f873377b6d8ff6f14aaba16cbe372cdc4ecfc376a4384e4420a2e0190c80a4ee4c11c2779648e86bed38edcc3a99700bd
-
SSDEEP
1536:abSshapMJgKJUuxGmfJPtOgqm1s/XZSWcH7:K25KJFjfJPtOgqm2/XZX6
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2788 winlgon.exe -
Loads dropped DLL 9 IoCs
pid Process 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe 2732 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe Set value (str) \REGISTRY\USER\S-1-5-21-457978338-2990298471-2379561640-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 2732 2788 WerFault.exe 30 2148 2716 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlgon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 2788 winlgon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2716 wrote to memory of 2788 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 30 PID 2716 wrote to memory of 2788 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 30 PID 2716 wrote to memory of 2788 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 30 PID 2716 wrote to memory of 2788 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 30 PID 2788 wrote to memory of 2732 2788 winlgon.exe 31 PID 2788 wrote to memory of 2732 2788 winlgon.exe 31 PID 2788 wrote to memory of 2732 2788 winlgon.exe 31 PID 2788 wrote to memory of 2732 2788 winlgon.exe 31 PID 2716 wrote to memory of 2148 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 33 PID 2716 wrote to memory of 2148 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 33 PID 2716 wrote to memory of 2148 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 33 PID 2716 wrote to memory of 2148 2716 edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe"C:\Users\Admin\AppData\Local\Temp\edcf3e3690b274df803bad164ea4aa4016ae8750b8350483b73dd198e79764d3.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
\??\c:\users\admin\appdata\local\temp\winlgon.exec:\users\admin\appdata\local\temp\winlgon.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2042⤵
- Program crash
PID:2148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5cb73c92c371650ee2cbbc7e6d55b8460
SHA12eb714fbabef274a95d3db0a00754429181cf7c9
SHA25671c37539abd63a321a296381d9586ab1035d46c845fcbf8521699766649ec25d
SHA5124b8dbe27078b7fe5a19acc2a732cb82e87ced5ba2affe655a92f6c44c4f57c1ea78967352226404a889019a62f0028f4963917637881ede6ae5a06a906ba72df