Analysis
-
max time kernel
141s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20241023-en -
resource tags
arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system -
submitted
01/03/2025, 05:23
Static task
static1
Behavioral task
behavioral1
Sample
bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe
Resource
win10v2004-20250217-en
General
-
Target
bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe
-
Size
579KB
-
MD5
62f5d80f18ab5045615c21b56112bf42
-
SHA1
5d357b7c43489e2106dd5281a504d297b539487d
-
SHA256
bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9
-
SHA512
82c8b05301b41d48494db62f7bb9d0b6a0aa5077a2e549bef2ea74d94212fa07c356872bf726d893f81352979a9ad2a2c08d444796f7b63c3929a3a742065aa7
-
SSDEEP
12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7/:rBJwdhMJ6ZzHrfcsMGTfZ5P/
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1844 Webfrequency.exe -
Loads dropped DLL 1 IoCs
pid Process 2928 bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1163522206-1469769407-485553996-1000\Software\Microsoft\Windows\CurrentVersion\Run\Webdevelop = "C:\\Users\\Admin\\AppData\\Roaming\\Webdevelop\\Webfrequency.exe" bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Webfrequency.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2928 wrote to memory of 1844 2928 bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe 31 PID 2928 wrote to memory of 1844 2928 bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe 31 PID 2928 wrote to memory of 1844 2928 bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe 31 PID 2928 wrote to memory of 1844 2928 bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe 31 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32 PID 1844 wrote to memory of 620 1844 Webfrequency.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe"C:\Users\Admin\AppData\Local\Temp\bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵PID:620
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
579KB
MD571400462d9b38342a461bad1eccf79cf
SHA1f34daba5b56f31cd9105837fbb3a7070b43a18a3
SHA256b94358a03a0a5f3425bddbb47959de9e6242fb48e8aae3bf3a1aaba8c23fce35
SHA512e87d85f4117b71b9ffda708fc8ffac7a01103402fe59855b9b5cd8a8d06734d33423736c5725676016ac63fe3ace46c36a998675a7e640d35e3934d5954c8f56