Analysis
-
max time kernel
21s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
18-10-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe
Resource
win10v2004-20241007-en
General
-
Target
88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe
-
Size
81KB
-
MD5
b93fcdd91a7f9848258fdc9ffae92390
-
SHA1
ac3f042b559519f094b1338518517cada99eb841
-
SHA256
88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7f
-
SHA512
5a2f2a0c8da6c4400c613c4724f1b9590f4b162574b872ae8c3256b9f01fa8f757b50e95a423e9f16b409b80ed5cbfbe800302e96bb2d56d4ea119268e1fae39
-
SSDEEP
1536:abSshapMJgKJUuxGmfJPtOgqm1s/XZSWcHU:K25KJFjfJPtOgqm2/XZXB
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 winlgon.exe -
Loads dropped DLL 9 IoCs
pid Process 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 3028 WerFault.exe 3028 WerFault.exe 3028 WerFault.exe 3028 WerFault.exe 3028 WerFault.exe 3028 WerFault.exe 3028 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 3028 2744 WerFault.exe 30 2536 2232 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlgon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 2744 winlgon.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2744 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 30 PID 2232 wrote to memory of 2744 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 30 PID 2232 wrote to memory of 2744 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 30 PID 2232 wrote to memory of 2744 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 30 PID 2744 wrote to memory of 3028 2744 winlgon.exe 31 PID 2744 wrote to memory of 3028 2744 winlgon.exe 31 PID 2744 wrote to memory of 3028 2744 winlgon.exe 31 PID 2744 wrote to memory of 3028 2744 winlgon.exe 31 PID 2232 wrote to memory of 2536 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 32 PID 2232 wrote to memory of 2536 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 32 PID 2232 wrote to memory of 2536 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 32 PID 2232 wrote to memory of 2536 2232 88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe"C:\Users\Admin\AppData\Local\Temp\88dd5114f472d1ce3bef5c38f2e1a6d81e7952ec4c1f39938345823c5f33ef7fN.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
\??\c:\users\admin\appdata\local\temp\winlgon.exec:\users\admin\appdata\local\temp\winlgon.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 2042⤵
- Program crash
PID:2536
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
81KB
MD5754be0bd38bc0c6d33f579be0afa0c76
SHA1c79539ed55dac9fa4cc8564d647c5332ce19e6b5
SHA256eaa935984b546541a4ee1f9668427a1446eb847e458e8cca81cf3251050384c8
SHA51271ff66310066bd002011664b891dd2a3c7a5a76a63fa3fb36774c3b09c5d8a210a346b4b2aec5d89c1db71dd91942d91e33f1ba28505d26049ceda523b999228