Analysis
-
max time kernel
137s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
14/10/2024, 00:57
Static task
static1
Behavioral task
behavioral1
Sample
8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe
Resource
win10v2004-20241007-en
General
-
Target
8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe
-
Size
110KB
-
MD5
bca374d85a9f5f7257fd1793c7c8a80a
-
SHA1
2b10b5fbe7282265a6394260081fb64a6e1332f6
-
SHA256
8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899
-
SHA512
c17d831d4ca42a912b1117c0741325f4c95c2e2f0207108594fcb341867da2b81564b797b5015171acec8a063ab8d56c7d41ead2db65593c573fb92f8ef1be54
-
SSDEEP
3072:5O248B0EMlIHxbHPwYV/wlmNie0ROfOlK:jLSzIHxMYV/9i1m
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1704 winlgon.exe 4592 rgsvr32.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2376 3088 WerFault.exe 82 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlgon.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rgsvr32.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 3088 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe 1704 winlgon.exe 1704 winlgon.exe 1704 winlgon.exe 1704 winlgon.exe 1704 winlgon.exe 1704 winlgon.exe 4592 rgsvr32.exe 4592 rgsvr32.exe 4592 rgsvr32.exe 4592 rgsvr32.exe 1704 winlgon.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3088 wrote to memory of 1704 3088 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe 83 PID 3088 wrote to memory of 1704 3088 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe 83 PID 3088 wrote to memory of 1704 3088 8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe 83 PID 1704 wrote to memory of 4592 1704 winlgon.exe 86 PID 1704 wrote to memory of 4592 1704 winlgon.exe 86 PID 1704 wrote to memory of 4592 1704 winlgon.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe"C:\Users\Admin\AppData\Local\Temp\8f3d98b5f4c7dd9bb0b956a4f4ea9fd5c8313ba0042a24ef81a269c7721ec899.exe"1⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3088 -
\??\c:\users\admin\appdata\local\temp\winlgon.exec:\users\admin\appdata\local\temp\winlgon.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\rgsvr32.exeC:\Users\Admin\AppData\Local\Temp\rgsvr32.exe3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:4592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3088 -s 6002⤵
- Program crash
PID:2376
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3088 -ip 30881⤵PID:3552
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5a22518e8a73ec19da806817d825d8a9c
SHA16f99e1591e1ce68ac44cd760729b2aeb2cba3559
SHA2561ab5d2ea45fbff4444eabb45a3a31538730ce56f2b9c041bcab958e3c69db97b
SHA5128f56ea79eab4b2e1d6b81981a9cd4f9652821b1cf17337ff3abf5796654fef08859fe4fa186015507b00ac606eefade1541235fcc6202ebf5257a1311638511e
-
Filesize
110KB
MD59de3ca7f0015a451a5dd5e61cc9108f5
SHA12191105599ee8de225c64a3c1d15513af32014c4
SHA256cdbd3d1cc89935e2669f90ea91af1c79046b15207bccc7a4cd05c30394d513e1
SHA5120786d372cceabade8d1d495dc527c64a41443418e4a3fdaf675ecd8ddcfe11c04afefed667f325efedb89c8a282880cc207efe1fcd38e9ac08dbbd38cab39b43