Analysis
-
max time kernel
95s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19/11/2024, 19:28
Static task
static1
Behavioral task
behavioral1
Sample
db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe
Resource
win10v2004-20241007-en
General
-
Target
db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe
-
Size
176KB
-
MD5
3666330031fe957cf31bc170fb793f5b
-
SHA1
6231b729f475efc4545c622788d3b89014a45007
-
SHA256
db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92
-
SHA512
77f0efe1cd6097015514450bfe8da716eb9906e8e82e5c5044d9ec53d9abfdf259f4539f9ad438e020466bc872fc44a0ad192c30697c85a748eb247b00adf737
-
SSDEEP
3072:sc4GQx3mAbm5XgshrK6RLzaVE1Hvb3qzpUupNctpAIZbhIMxSiBP61:OGEoh260VOHvb6fpCAIRrSiJk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2136 winservice.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\winsystem\winservice.exe db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe File opened for modification C:\Windows\winsystem\winservice.exe db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe File created C:\Windows\winsystem\Task.xml winservice.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 556 2136 WerFault.exe 85 -
System Location Discovery: System Language Discovery 1 TTPs 5 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winservice.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 2344 db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe 2344 db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe 2344 db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe 2136 winservice.exe 2136 winservice.exe 2136 winservice.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2344 wrote to memory of 2136 2344 db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe 85 PID 2344 wrote to memory of 2136 2344 db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe 85 PID 2344 wrote to memory of 2136 2344 db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe 85 PID 2136 wrote to memory of 3968 2136 winservice.exe 89 PID 2136 wrote to memory of 3968 2136 winservice.exe 89 PID 2136 wrote to memory of 3968 2136 winservice.exe 89 PID 3968 wrote to memory of 3356 3968 cmd.exe 91 PID 3968 wrote to memory of 3356 3968 cmd.exe 91 PID 3968 wrote to memory of 3356 3968 cmd.exe 91 PID 3968 wrote to memory of 3840 3968 cmd.exe 92 PID 3968 wrote to memory of 3840 3968 cmd.exe 92 PID 3968 wrote to memory of 3840 3968 cmd.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe"C:\Users\Admin\AppData\Local\Temp\db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92.exe"1⤵
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2344 -
C:\Windows\winsystem\winservice.exeC:\Windows\winsystem\winservice.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\SysWOW64\cmd.execmd /c mode con cp select=437&schtasks /query /tn "Microsoft\Windows\Windows Error Reporting\QueueReporting" /xml3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3968 -
C:\Windows\SysWOW64\mode.commode con cp select=4374⤵
- System Location Discovery: System Language Discovery
PID:3356
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /query /tn "Microsoft\Windows\Windows Error Reporting\QueueReporting" /xml4⤵
- System Location Discovery: System Language Discovery
PID:3840
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 12603⤵
- Program crash
PID:556
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2136 -ip 21361⤵PID:404
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
176KB
MD53666330031fe957cf31bc170fb793f5b
SHA16231b729f475efc4545c622788d3b89014a45007
SHA256db556f215eb5529d17505dc63193c735ec7b72a74fc12c6a9a5631f407a40d92
SHA51277f0efe1cd6097015514450bfe8da716eb9906e8e82e5c5044d9ec53d9abfdf259f4539f9ad438e020466bc872fc44a0ad192c30697c85a748eb247b00adf737