Analysis

  • max time kernel
    141s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20241023-en
  • resource tags

    arch:x64arch:x86image:win7-20241023-enlocale:en-usos:windows7-x64system
  • submitted
    01/03/2025, 05:23

General

  • Target

    bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe

  • Size

    579KB

  • MD5

    62f5d80f18ab5045615c21b56112bf42

  • SHA1

    5d357b7c43489e2106dd5281a504d297b539487d

  • SHA256

    bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9

  • SHA512

    82c8b05301b41d48494db62f7bb9d0b6a0aa5077a2e549bef2ea74d94212fa07c356872bf726d893f81352979a9ad2a2c08d444796f7b63c3929a3a742065aa7

  • SSDEEP

    12288:YbD5arFJwK6hMJ6ZzHFZfc28beMGTfZuqb7/:rBJwdhMJ6ZzHrfcsMGTfZ5P/

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe
    "C:\Users\Admin\AppData\Local\Temp\bdf408fec4d45044fbd8cf1ed2f5a2e3bfdd64634dc74a99678fc612ce09cab9.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2928
    • C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe
      "C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe"
      2⤵
      • Executes dropped EXE
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:1844
      • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe
        "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"
        3⤵
          PID:620

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Roaming\Webdevelop\Webfrequency.exe

      Filesize

      579KB

      MD5

      71400462d9b38342a461bad1eccf79cf

      SHA1

      f34daba5b56f31cd9105837fbb3a7070b43a18a3

      SHA256

      b94358a03a0a5f3425bddbb47959de9e6242fb48e8aae3bf3a1aaba8c23fce35

      SHA512

      e87d85f4117b71b9ffda708fc8ffac7a01103402fe59855b9b5cd8a8d06734d33423736c5725676016ac63fe3ace46c36a998675a7e640d35e3934d5954c8f56

    • memory/1844-15-0x0000000000960000-0x00000000009F4000-memory.dmp

      Filesize

      592KB

    • memory/1844-16-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/1844-17-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/1844-18-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/1844-19-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/1844-20-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2928-2-0x0000000000450000-0x000000000045A000-memory.dmp

      Filesize

      40KB

    • memory/2928-3-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2928-4-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

      Filesize

      4KB

    • memory/2928-5-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2928-1-0x0000000000A90000-0x0000000000B24000-memory.dmp

      Filesize

      592KB

    • memory/2928-14-0x0000000074C50000-0x000000007533E000-memory.dmp

      Filesize

      6.9MB

    • memory/2928-0-0x0000000074C5E000-0x0000000074C5F000-memory.dmp

      Filesize

      4KB