Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 02:46
Static task
static1
Behavioral task
behavioral1
Sample
139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe
Resource
win10v2004-20241007-en
General
-
Target
139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe
-
Size
78KB
-
MD5
d5ae0008032818e51abe3d53868d9c06
-
SHA1
aa7993aa73f323b35fe5468a3872d7c786e42d5d
-
SHA256
139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719
-
SHA512
793d8119e5328132752dca6f0b6d7491ab72f18f8083d1d36743d6ee22e10ba8097d881803a2f4f1f5d27eb9e737fb42de54d4304b681736c225ea9a120426a4
-
SSDEEP
1536:abSshapMJgKJUuxGmfJPtOgqm1s/XZSWcH5:K25KJFjfJPtOgqm2/XZXk
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2432 winlgon.exe -
Loads dropped DLL 9 IoCs
pid Process 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe Set value (str) \REGISTRY\USER\S-1-5-21-3533259084-2542256011-65585152-1000\Software\Microsoft\Windows\CurrentVersion\Run\winlgon.exe = "c:\\users\\admin\\appdata\\local\\temp\\winlgon.exe" 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2316 2432 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language winlgon.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 2432 winlgon.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2432 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 30 PID 2136 wrote to memory of 2432 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 30 PID 2136 wrote to memory of 2432 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 30 PID 2136 wrote to memory of 2432 2136 139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe 30 PID 2432 wrote to memory of 2316 2432 winlgon.exe 31 PID 2432 wrote to memory of 2316 2432 winlgon.exe 31 PID 2432 wrote to memory of 2316 2432 winlgon.exe 31 PID 2432 wrote to memory of 2316 2432 winlgon.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe"C:\Users\Admin\AppData\Local\Temp\139174a2bd30566c5c3d2d65da55dcfbf013e23359c9424590ba83cb0576d719.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
\??\c:\users\admin\appdata\local\temp\winlgon.exec:\users\admin\appdata\local\temp\winlgon.exe2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 2563⤵
- Loads dropped DLL
- Program crash
PID:2316
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5b822bbd3b2ace841c424fa62074014fd
SHA1f4fc701149c0f2eb6e0f40696148c7effbc237c7
SHA2566e7ac5f82a87172139c497bf07fd139338f6b00f7dd562f8b38def3c9a033eab
SHA5128e4cc1d479fc37447e0ad6a56aebc643e9a28efd059841f84c62b5efa4d0ac18bbb9c0dddaa0a23540365fe299fe1451037c10e2b83e961e1071a96fdaf6e8e8