Analysis

  • max time kernel
    113s
  • max time network
    40s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    29/10/2024, 23:14

General

  • Target

    https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&

Score
8/10

Malware Config

Signatures

  • Downloads MZ/PE file
  • Executes dropped EXE 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 27 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

  • Uses Volume Shadow Copy WMI provider

    The Volume Shadow Copy service is used to manage backups/snapshots.

  • Uses Volume Shadow Copy service COM API

    The Volume Shadow Copy service is used to manage backups/snapshots.

Processes

  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" https://cdn.discordapp.com/attachments/1300886873148756050/1300960864043663533/winws.exe?ex=6722bdb8&is=67216c38&hm=6421a3d612c9b6c41279c7a97310aba4b86dbc69dc16a3bc8027d28cde7073e8&
    1⤵
    • Modifies Internet Explorer Phishing Filter
    • Modifies Internet Explorer settings
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2244
    • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
      "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:2244 CREDAT:275457 /prefetch:2
      2⤵
      • System Location Discovery: System Language Discovery
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:2720
    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe
      "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2164
      • C:\Program Files\Java\jre7\bin\javaw.exe
        "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe"
        3⤵
          PID:2200
        • C:\Program Files\Java\jre7\bin\javaw.exe
          "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe"
          3⤵
            PID:2816
          • C:\Program Files\Java\jre7\bin\javaw.exe
            "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe"
            3⤵
              PID:1784
            • C:\Program Files\Java\jre7\bin\javaw.exe
              "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe"
              3⤵
                PID:2908
              • C:\Program Files\Java\jre7\bin\javaw.exe
                "C:\Program Files\Java\jre7\bin\javaw.exe" -jar "C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\M4TQDAHL\winws.exe"
                3⤵
                  PID:1004

            Network

                  MITRE ATT&CK Enterprise v15

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\EOYL2MRI\winws[1].exe

                    Filesize

                    113KB

                    MD5

                    7cf417d06a24c1ade73ec6d8ae589077

                    SHA1

                    128516790f9c6d8ac1d33a9f1f2b854162d94942

                    SHA256

                    270723a06c0f917204923693f09cc0d6cd2cc9cefd59fc051cfbf920d26f17d8

                    SHA512

                    3f5615b04489cfc755e19efc30fe619026dfacd250bb1c1677e1c55ceb6f69a80d0f05760c157696985e1090c34e8e403b453e5680fb981f274bdd66e2fcb5bb

                  • memory/1004-103-0x0000000000230000-0x0000000000231000-memory.dmp

                    Filesize

                    4KB

                  • memory/1784-71-0x0000000002580000-0x00000000027F0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/1784-78-0x0000000000140000-0x0000000000141000-memory.dmp

                    Filesize

                    4KB

                  • memory/1784-79-0x0000000002580000-0x00000000027F0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2164-59-0x0000000000400000-0x000000000041E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2164-102-0x0000000000400000-0x000000000041E000-memory.dmp

                    Filesize

                    120KB

                  • memory/2200-33-0x0000000002430000-0x00000000026A0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2200-42-0x0000000001C60000-0x0000000001C61000-memory.dmp

                    Filesize

                    4KB

                  • memory/2200-43-0x0000000002430000-0x00000000026A0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2816-46-0x00000000024F0000-0x0000000002760000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2816-66-0x00000000024F0000-0x0000000002760000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2816-65-0x0000000000430000-0x0000000000431000-memory.dmp

                    Filesize

                    4KB

                  • memory/2816-60-0x00000000024F0000-0x0000000002760000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2816-58-0x0000000000430000-0x0000000000431000-memory.dmp

                    Filesize

                    4KB

                  • memory/2908-82-0x0000000002450000-0x00000000026C0000-memory.dmp

                    Filesize

                    2.4MB

                  • memory/2908-91-0x0000000000540000-0x0000000000541000-memory.dmp

                    Filesize

                    4KB

                  • memory/2908-92-0x0000000002450000-0x00000000026C0000-memory.dmp

                    Filesize

                    2.4MB