Analysis
-
max time kernel
95s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
04/10/2024, 09:53
Behavioral task
behavioral1
Sample
test.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
test.exe
Resource
win10v2004-20240802-en
General
-
Target
test.exe
-
Size
121KB
-
MD5
e59f731d9d2e14c582aa15db91dd8259
-
SHA1
a5775aaa66e17fdd078926069b6da8e1f80618f6
-
SHA256
dbf5ee189f70c780641ecc0d50ec41adb2f3eb718b3dd6e0f611cc8fb96e29d5
-
SHA512
6a842ffc1c6340569c94d44f69841c244314dfb6f384cb64670b260699270fda5484ccb89127c001729bc33d292c959b2833befa0cd8f9146b17ce03c1bb61d6
-
SSDEEP
3072:dVt8iWvAOF45MRZaptxWi9xAqJ9gSvEvDaAlGR6kX+E:dX8iWvAGRZadWi9bgSvKD1Q6m+
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "explorer.exe C:\\Windows\\system32\\vxdmgr32.exe" test.exe -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\rundllw.exe test.exe -
Loads dropped DLL 1 IoCs
pid Process 2904 test.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\load32 = "C:\\Windows\\system32\\load32.exe" test.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\load32.exe test.exe File created C:\Windows\SysWOW64\vxdmgr32.exe test.exe File created C:\Windows\SysWOW64\load32.exe test.exe -
resource yara_rule behavioral2/memory/2904-0-0x0000000000400000-0x000000000044E000-memory.dmp upx behavioral2/memory/2904-10-0x0000000000400000-0x000000000044E000-memory.dmp upx -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\dllreg.exe test.exe File created C:\Windows\sock64.dll test.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2176 2904 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language test.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\test.exe"C:\Users\Admin\AppData\Local\Temp\test.exe"1⤵
- Modifies WinLogon for persistence
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:2904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 6202⤵
- Program crash
PID:2176
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 2904 -ip 29041⤵PID:4496
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
30KB
MD539c0f2c6554f7084ed2041c611f4dcd1
SHA11f478b17868be98e257a83b66d6d18b50fabc124
SHA256b8f29db0d8571fc23dbdc8116eeaebdc51c8f654e73ff82ae52e76e620cd294a
SHA512c76d7445d743e540aac19f5985450c6f8f67ffd7981a6324c0e4f7c4dfcd1b7aac4845ff327894a06cd6b910d31c490397860cf7cb8e96565e330f1bbad02ff6