Resubmissions

14-07-2024 08:16

240714-j6aelavgkf 3

28-03-2024 15:44

240328-s6f2tahh81 3

15-02-2024 03:14

240215-drq6xafb7s 6

05-02-2024 16:35

240205-t3whrsebaq 3

05-02-2024 16:32

240205-t17g9aeagl 3

08-12-2023 22:35

231208-2hv1haegb3 3

31-10-2023 16:20

231031-ttf2qaba4t 10

24-10-2023 18:54

231024-xkm1fsgg8z 10

20-09-2023 14:18

230920-rl8qnagg4s 10

23-08-2023 22:11

230823-139hyshd3w 10

Analysis

  • max time kernel
    86s
  • max time network
    98s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240214-en
  • resource tags

    arch:x64arch:x86image:win11-20240214-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    15-02-2024 03:14

Errors

Reason
Machine shutdown

General

  • Target

    dl2.exe

  • Size

    849KB

  • MD5

    c2055b7fbaa041d9f68b9d5df9b45edd

  • SHA1

    e4bd443bd4ce9029290dcd4bb47cb1a01f3b1b06

  • SHA256

    342f04c4720590c40d24078d46d9b19d8175565f0af460598171d58f5ffc48f3

  • SHA512

    18905b75938b8af9468b1aa3ffbae796a139c2762e623aa6ffb9ec2b293dd04aa1f90d1ed5a7dbda7853795a3688e368121a134c7f63e527a8e5e7679301a1dc

  • SSDEEP

    12288:A3RY3yNqMRTF4q2rxHn2ot/81xpNQyjUXlmoe7ufjHAtjXD7r2:A3RY3R24q+xn/8Xp2yOl5fzQ/2

Score
6/10

Malware Config

Signatures

  • Drops desktop.ini file(s) 1 IoCs
  • Modifies data under HKEY_USERS 52 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dl2.exe
    "C:\Users\Admin\AppData\Local\Temp\dl2.exe"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:1736
  • C:\Users\Admin\AppData\Local\Temp\dl2.exe
    C:\Users\Admin\AppData\Local\Temp\dl2.exe {879AA33C-ECCE-4E4F-ABF5-E1841DA09F35}
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:3856
  • C:\Windows\system32\LogonUI.exe
    "LogonUI.exe" /flags:0x0 /state0:0xa39fd055 /state1:0x41c64e6d
    1⤵
    • Drops desktop.ini file(s)
    • Modifies data under HKEY_USERS
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:4640

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-176679640-153325197-3537295364-1000\ReadOnly\LockScreen_O\LockScreen___1280_0720_notdimmed.jpg

    Filesize

    178KB

    MD5

    bd724503a8cc7942172af7a7d7f693e5

    SHA1

    f0ea7bebe785623d0e4f63da3c70e91a1f7d53b9

    SHA256

    8dba82fab75c3041264e5c6224c2fe2e2f4e3116c0a45356583779b31be29c23

    SHA512

    c28778d0c30388cce1831c22fcd3a1f231064a61218364f3cf760c8c8d8981e5632301c31af8cef1d4226d3296392b5d1a2a790e647b945937fd582f3d7067a5

  • C:\ProgramData\Microsoft\Windows\SystemData\S-1-5-21-176679640-153325197-3537295364-1000\ReadOnly\LockScreen_Z\LockScreen___1280_0720_notdimmed.jpg

    Filesize

    62KB

    MD5

    6cb7e9f13c79d1dd975a8aa005ab0256

    SHA1

    eac7fc28cc13ac1e9c85f828215cd61f0c698ae3

    SHA256

    af2537d470fddbeda270c965b8dbdf7e9ccf480ed2f525012e2f1035112a6d67

    SHA512

    3a40359d8e4cc8792be78a022dc04daed5c1cc55d78fe9cf3e061ea5587baa15023ce2152238f5be5cc5124cd468f220cf9dab54344d93edd3dfcd400b24469d

  • memory/1736-2-0x0000000000660000-0x0000000000760000-memory.dmp

    Filesize

    1024KB

  • memory/1736-1-0x0000000002250000-0x0000000002280000-memory.dmp

    Filesize

    192KB

  • memory/1736-18-0x0000000000660000-0x0000000000760000-memory.dmp

    Filesize

    1024KB

  • memory/3856-10-0x0000000002260000-0x0000000002290000-memory.dmp

    Filesize

    192KB

  • memory/3856-12-0x0000000000650000-0x0000000000750000-memory.dmp

    Filesize

    1024KB