Analysis
-
max time kernel
149s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/01/2025, 20:06
Static task
static1
Behavioral task
behavioral1
Sample
18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe
Resource
win10v2004-20241007-en
General
-
Target
18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe
-
Size
578KB
-
MD5
528bec23dc50ef64a2484625ec52ddc5
-
SHA1
f7b7a6a139e3ab2e5121dca5154de9c4c51b033d
-
SHA256
18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e
-
SHA512
2568521bc3d3c80c7df707e75ddc987d68dc6c1ec78a37ceecadc3d4d0aa0dd2a68b9109249494e831ac79b69665fb1129fb19c6d2ba4c34d7195f32d83a8131
-
SSDEEP
12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7/:rBJwdhMJ6ZzHrfcsMGTfZ5P/
Malware Config
Signatures
-
Imminent family
-
Executes dropped EXE 1 IoCs
pid Process 2308 Webfrequency.exe -
Loads dropped DLL 1 IoCs
pid Process 2348 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webdevelop = "C:\\Users\\Admin\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe" 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2308 set thread context of 3004 2308 Webfrequency.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Webfrequency.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language RegAsm.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 3004 RegAsm.exe Token: 33 3004 RegAsm.exe Token: SeIncBasePriorityPrivilege 3004 RegAsm.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3004 RegAsm.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2348 wrote to memory of 2308 2348 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe 31 PID 2348 wrote to memory of 2308 2348 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe 31 PID 2348 wrote to memory of 2308 2348 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe 31 PID 2348 wrote to memory of 2308 2348 18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe 31 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33 PID 2308 wrote to memory of 3004 2308 Webfrequency.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe"C:\Users\Admin\AppData\Local\Temp\18d4a9a71d86f01ea67f31471d4d4f0f9eb8a3b6059531418dd790d58dd3545e.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2308 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
-
C:\Windows\system32\wbem\WmiApSrv.exeC:\Windows\system32\wbem\WmiApSrv.exe1⤵PID:2692
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
578KB
MD5306d0b7db87a3b2aacaf3dc90580628d
SHA130fc668e4ce2aad1e2bf06f5daf708f04f8f7d57
SHA256a578096e545a1d523eaf600b2f79a62d73081273f778d27ff488d3c07322c329
SHA5129f18682d8f3954653c7b456ca33cd99d54368029cff89b616eec01d9d127a7ba0ea7802f46b55036c80a2038c0777d77b70bab57129ebb2348c066c8f107aadf