Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 23:09

General

  • Target

    b9e65dcaaebcaaa7393f677997a7aa79.exe

  • Size

    35KB

  • MD5

    b9e65dcaaebcaaa7393f677997a7aa79

  • SHA1

    fee140708be425e5ec3a827ee6083f1ec7072a13

  • SHA256

    798f8698fc6a500b954a0bad01acc25e9120c2ab3e7c74c40e8f9ff936129b28

  • SHA512

    34c4a35efef7c73b2a8198005589822d438f9674934bc0ca355bce9db02652304501abab1195d81baa53b5052be0808848bc0d701d831de7efdcb2f5002bf0ed

  • SSDEEP

    768:WSFD2Dn9m9VTXiOjO4ZcXZbgFqKdbdNhe05WPCc2erQl:WSx2ZmrTXljORXFgFT5Jh5WPCcdEl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e65dcaaebcaaa7393f677997a7aa79.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e65dcaaebcaaa7393f677997a7aa79.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\SysWOW64\sovlost.exe
      "C:\Windows\system32\sovlost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2512
    • C:\Windows\SysWOW64\sychost.exe
      "C:\Windows\system32\sychost.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\sichost.exe
        "C:\Windows\system32\sichost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2580

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\discard.ini

    Filesize

    91B

    MD5

    8f05f9a770bb85e64bb0e559bd1bf908

    SHA1

    8339b5d9eb911aa2c1da49ac7a7ec06dbd237347

    SHA256

    b5228a86abb336cc4f8fac4703f38ea5c005f245bbaf04d119a8a0c36239cfac

    SHA512

    8f232deb20d61fa58f7d5abd93b367e15f3b9f2b0a264d5b905641231f5ffc0419a3c6903285d7e9976e5f73015a5959b8c585e7cf8cca438b12f51e5d939631

  • C:\Windows\SysWOW64\discard.ini

    Filesize

    26B

    MD5

    d8ab3ea023fda33b8017ccc4748534f8

    SHA1

    e5c8b0f40ed03ad98f0d207ee073af2ee925db78

    SHA256

    14776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab

    SHA512

    0a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0

  • C:\Windows\SysWOW64\sichost.exe

    Filesize

    35KB

    MD5

    b9e65dcaaebcaaa7393f677997a7aa79

    SHA1

    fee140708be425e5ec3a827ee6083f1ec7072a13

    SHA256

    798f8698fc6a500b954a0bad01acc25e9120c2ab3e7c74c40e8f9ff936129b28

    SHA512

    34c4a35efef7c73b2a8198005589822d438f9674934bc0ca355bce9db02652304501abab1195d81baa53b5052be0808848bc0d701d831de7efdcb2f5002bf0ed

  • C:\Windows\SysWOW64\ssdtti.sys

    Filesize

    2KB

    MD5

    1e14c892a6d3bd78c5508a13873b9e7b

    SHA1

    a817f4492fd9b0013eda6cb45624af8ce4b04efa

    SHA256

    99cc0877502487b5d58ce9921366fbd299253673c33c8b4d67fc872323dc334e

    SHA512

    11b0393308cb5239c4f0a7c31d6fd09e03c7a623941d1c408f1ab4119ba4089382a57db7a52990009f20ec54eb71dff2aafd6c75a0c17789edabf6f85dd298e6

  • \Windows\SysWOW64\sovlost.exe

    Filesize

    20KB

    MD5

    33bb2a692bd2dada7d6f7a574dce9305

    SHA1

    e18ab04b0f3d4cd7c968bd0c0b3b6d1ffd66b96b

    SHA256

    af27d3417da82b642c67a80d6d98f815b9ebf333e8038c9f4446ae598475afb7

    SHA512

    474a626a2d598a9be2cbba06257d5dc9115cf6b099df804a9e7860965dec03df365e4d351088ec04ac6c2d53c047db71007d01ec5e6258e67bd5f20c71195b23

  • \Windows\SysWOW64\sychost.exe

    Filesize

    20KB

    MD5

    abdb1a784dcaefcbfb8af28599293f4f

    SHA1

    f1601133a072db15d5941628549544771a9a264c

    SHA256

    e7fa8bd434c1ca284b24e16b49ce888523af62dbdffc51325e467807796d12b1

    SHA512

    8880edc42b33d750c731fdb94382edb608df31338bb882179c45b4b6873c168f12ae4854d1b01e2c58f9b56d4003adad6a18f8e5b3312e25a5b6cf7423d709c3

  • memory/2232-0-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2232-1-0x0000000000310000-0x0000000000311000-memory.dmp

    Filesize

    4KB

  • memory/2232-21-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2580-36-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB

  • memory/2580-42-0x00000000008C0000-0x000000000091D000-memory.dmp

    Filesize

    372KB

  • memory/2580-44-0x0000000000400000-0x000000000045D000-memory.dmp

    Filesize

    372KB