Analysis
-
max time kernel
149s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 04:39
Static task
static1
Behavioral task
behavioral1
Sample
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
Resource
win10v2004-20241007-en
General
-
Target
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
-
Size
577KB
-
MD5
e9bd9c64632c5db5747b37b3454e6cfd
-
SHA1
94dd85e7e20b1b4a4a7b20b60532aa9cb6f045fa
-
SHA256
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e
-
SHA512
35de0589431caa05e33c41efde0fa2f3888e79475d19d087d1aa4295686fb7e753245fad3451103436d62bb0f62fb291a661bb7c4a8a91e5670aead73958be59
-
SSDEEP
12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7t:rBJwdhMJ6ZzHrfcsMGTfZ5Pt
Malware Config
Signatures
-
Imminent family
-
Executes dropped EXE 1 IoCs
pid Process 2380 Webfrequency.exe -
Loads dropped DLL 1 IoCs
pid Process 2900 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4177215427-74451935-3209572229-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webdevelop = "C:\\Users\\Admin\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe" 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2380 set thread context of 892 2380 Webfrequency.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Webfrequency.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 892 RegAsm.exe Token: 33 892 RegAsm.exe Token: SeIncBasePriorityPrivilege 892 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 892 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2900 wrote to memory of 2380 2900 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2900 wrote to memory of 2380 2900 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2900 wrote to memory of 2380 2900 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2900 wrote to memory of 2380 2900 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32 PID 2380 wrote to memory of 892 2380 Webfrequency.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe"C:\Users\Admin\AppData\Local\Temp\93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2380 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:892
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:1004
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD51a76b6aee3b86f097601f517bcd68f82
SHA1b683dc15d66dd51fbf95f632755205522cd04ed9
SHA256d9a75965ff287e064b0b9b3eed6601906fd2cb3da4b57d30e61cf6bbd370f5a7
SHA512d926077085bf2a891782b1dada8319282f72996d79a974e47a62ecd13dba7f31d17eb86c5568b689cc23cffc853e8e8d678e815b529f61630dc4f4826e2719b9