Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
08-01-2025 04:45
Static task
static1
Behavioral task
behavioral1
Sample
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
Resource
win10v2004-20241007-en
General
-
Target
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe
-
Size
577KB
-
MD5
e9bd9c64632c5db5747b37b3454e6cfd
-
SHA1
94dd85e7e20b1b4a4a7b20b60532aa9cb6f045fa
-
SHA256
93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e
-
SHA512
35de0589431caa05e33c41efde0fa2f3888e79475d19d087d1aa4295686fb7e753245fad3451103436d62bb0f62fb291a661bb7c4a8a91e5670aead73958be59
-
SSDEEP
12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7t:rBJwdhMJ6ZzHrfcsMGTfZ5Pt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1460 Webfrequency.exe -
Loads dropped DLL 1 IoCs
pid Process 2240 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3692679935-4019334568-335155002-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webdevelop = "C:\\Users\\Admin\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe" 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1460 set thread context of 2216 1460 Webfrequency.exe 32 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Webfrequency.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2240 wrote to memory of 1460 2240 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2240 wrote to memory of 1460 2240 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2240 wrote to memory of 1460 2240 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 2240 wrote to memory of 1460 2240 93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe 31 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32 PID 1460 wrote to memory of 2216 1460 Webfrequency.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe"C:\Users\Admin\AppData\Local\Temp\93f4716eec9d3180c1c1e56b346b0b61be55fc5c7bd4ea0bf1413982c5fcb18e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2240 -
C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
PID:2216
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
577KB
MD55254b7a2d977638ee2b00969bccd3df3
SHA1cb032725e791ebf1b98a65f360e821e92a72bb93
SHA256a457baa09e433b7629d36f6b0f5c7b7d046e7d702182f4c88dab082564f77c29
SHA51244ca182c6cdbba9d3c7734074a1bd9f88a317bac2281b4d1aaca69ec8693babdfefe18a4644fad27b0b08fed35c3e18065f245c7b81b2c2d24c25e16053fa544