Analysis
-
max time kernel
116s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-11-2024 11:12
Static task
static1
Behavioral task
behavioral1
Sample
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe
Resource
win7-20240903-en
General
-
Target
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe
-
Size
88KB
-
MD5
8b97b5ed374d6e68451e6742133c3630
-
SHA1
061b5daf8569180fb017b3df17ef7a9ba17e983d
-
SHA256
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86
-
SHA512
3d5639a3459fcd1f33c4119b93bc15b875bae023da7933f5d3e964aac1c2bde4a2374faa35f0080bfaa7135c4840deab0877ba4b17d5437b4be32bdfe81bc799
-
SSDEEP
1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEn:6D0ctAVA/bmxIMnoKjyR/Nn
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
winlogonr.exepid Process 251368 winlogonr.exe -
Loads dropped DLL 5 IoCs
Processes:
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exepid Process 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
reg.exedescription ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1846800975-3917212583-2893086201-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlogon = "C:\\Users\\Admin\\AppData\\Roaming\\winlogonr\\winlogonr.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exedescription pid Process procid_target PID 2068 set thread context of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 -
Processes:
resource yara_rule behavioral1/memory/250932-540769-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/250932-540768-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/250932-540767-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/250932-540764-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/250932-540762-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/250932-540811-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
winlogonr.exe48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.execmd.exereg.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlogonr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exewinlogonr.exepid Process 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 251368 winlogonr.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.execmd.exedescription pid Process procid_target PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 2068 wrote to memory of 250932 2068 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 31 PID 250932 wrote to memory of 251244 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 32 PID 250932 wrote to memory of 251244 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 32 PID 250932 wrote to memory of 251244 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 32 PID 250932 wrote to memory of 251244 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 32 PID 251244 wrote to memory of 251308 251244 cmd.exe 34 PID 251244 wrote to memory of 251308 251244 cmd.exe 34 PID 251244 wrote to memory of 251308 251244 cmd.exe 34 PID 251244 wrote to memory of 251308 251244 cmd.exe 34 PID 250932 wrote to memory of 251368 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 35 PID 250932 wrote to memory of 251368 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 35 PID 250932 wrote to memory of 251368 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 35 PID 250932 wrote to memory of 251368 250932 48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"C:\Users\Admin\AppData\Local\Temp\48235feba2ab606004db39d1d3bcbf78513a6bde366469d5556b5456aa635c86N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:250932 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OGXPL.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:251244 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:251308
-
-
-
C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"3⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:251368
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149B
MD56831b89d0b8dc3e07588d733e75c122b
SHA18c70088c3224bbaf535ed19ec0f6bd5231c543be
SHA2569fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2
SHA512699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da
-
Filesize
88KB
MD5ed2acd4c102294d31109b5058c47b5a5
SHA167f60e1abf7b4eba31404cd4cb54590bddfc2b48
SHA256ab6bfeb31e22b18d5862ac0cad6b07af47f721136c10888d100e132faeb916f9
SHA512bf786ff6b87316a467f0ff6b41d20aa352298a9fd6ee1a4fb432321fdb5653ca0382228fe9c35a27a93316b48c2cd30631859400d3a70444004ad51c0c548cbf