Analysis

  • max time kernel
    117s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    07/03/2024, 23:09

General

  • Target

    b9e65dcaaebcaaa7393f677997a7aa79.exe

  • Size

    35KB

  • MD5

    b9e65dcaaebcaaa7393f677997a7aa79

  • SHA1

    fee140708be425e5ec3a827ee6083f1ec7072a13

  • SHA256

    798f8698fc6a500b954a0bad01acc25e9120c2ab3e7c74c40e8f9ff936129b28

  • SHA512

    34c4a35efef7c73b2a8198005589822d438f9674934bc0ca355bce9db02652304501abab1195d81baa53b5052be0808848bc0d701d831de7efdcb2f5002bf0ed

  • SSDEEP

    768:WSFD2Dn9m9VTXiOjO4ZcXZbgFqKdbdNhe05WPCc2erQl:WSx2ZmrTXljORXFgFT5Jh5WPCcdEl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 11 IoCs
  • Drops file in System32 directory 8 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious behavior: LoadsDriver 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 7 IoCs
  • Suspicious use of WriteProcessMemory 18 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b9e65dcaaebcaaa7393f677997a7aa79.exe
    "C:\Users\Admin\AppData\Local\Temp\b9e65dcaaebcaaa7393f677997a7aa79.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2232
    • C:\Windows\SysWOW64\sovlost.exe
      "C:\Windows\system32\sovlost.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      PID:2512
    • C:\Windows\SysWOW64\sychost.exe
      "C:\Windows\system32\sychost.exe"
      2⤵
      • Deletes itself
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in System32 directory
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2632
      • C:\Windows\SysWOW64\sichost.exe
        "C:\Windows\system32\sichost.exe"
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:2580

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\discard.ini

          Filesize

          91B

          MD5

          8f05f9a770bb85e64bb0e559bd1bf908

          SHA1

          8339b5d9eb911aa2c1da49ac7a7ec06dbd237347

          SHA256

          b5228a86abb336cc4f8fac4703f38ea5c005f245bbaf04d119a8a0c36239cfac

          SHA512

          8f232deb20d61fa58f7d5abd93b367e15f3b9f2b0a264d5b905641231f5ffc0419a3c6903285d7e9976e5f73015a5959b8c585e7cf8cca438b12f51e5d939631

        • C:\Windows\SysWOW64\discard.ini

          Filesize

          26B

          MD5

          d8ab3ea023fda33b8017ccc4748534f8

          SHA1

          e5c8b0f40ed03ad98f0d207ee073af2ee925db78

          SHA256

          14776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab

          SHA512

          0a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0

        • C:\Windows\SysWOW64\sichost.exe

          Filesize

          35KB

          MD5

          b9e65dcaaebcaaa7393f677997a7aa79

          SHA1

          fee140708be425e5ec3a827ee6083f1ec7072a13

          SHA256

          798f8698fc6a500b954a0bad01acc25e9120c2ab3e7c74c40e8f9ff936129b28

          SHA512

          34c4a35efef7c73b2a8198005589822d438f9674934bc0ca355bce9db02652304501abab1195d81baa53b5052be0808848bc0d701d831de7efdcb2f5002bf0ed

        • C:\Windows\SysWOW64\ssdtti.sys

          Filesize

          2KB

          MD5

          1e14c892a6d3bd78c5508a13873b9e7b

          SHA1

          a817f4492fd9b0013eda6cb45624af8ce4b04efa

          SHA256

          99cc0877502487b5d58ce9921366fbd299253673c33c8b4d67fc872323dc334e

          SHA512

          11b0393308cb5239c4f0a7c31d6fd09e03c7a623941d1c408f1ab4119ba4089382a57db7a52990009f20ec54eb71dff2aafd6c75a0c17789edabf6f85dd298e6

        • \Windows\SysWOW64\sovlost.exe

          Filesize

          20KB

          MD5

          33bb2a692bd2dada7d6f7a574dce9305

          SHA1

          e18ab04b0f3d4cd7c968bd0c0b3b6d1ffd66b96b

          SHA256

          af27d3417da82b642c67a80d6d98f815b9ebf333e8038c9f4446ae598475afb7

          SHA512

          474a626a2d598a9be2cbba06257d5dc9115cf6b099df804a9e7860965dec03df365e4d351088ec04ac6c2d53c047db71007d01ec5e6258e67bd5f20c71195b23

        • \Windows\SysWOW64\sychost.exe

          Filesize

          20KB

          MD5

          abdb1a784dcaefcbfb8af28599293f4f

          SHA1

          f1601133a072db15d5941628549544771a9a264c

          SHA256

          e7fa8bd434c1ca284b24e16b49ce888523af62dbdffc51325e467807796d12b1

          SHA512

          8880edc42b33d750c731fdb94382edb608df31338bb882179c45b4b6873c168f12ae4854d1b01e2c58f9b56d4003adad6a18f8e5b3312e25a5b6cf7423d709c3

        • memory/2232-0-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/2232-1-0x0000000000310000-0x0000000000311000-memory.dmp

          Filesize

          4KB

        • memory/2232-21-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/2580-36-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB

        • memory/2580-42-0x00000000008C0000-0x000000000091D000-memory.dmp

          Filesize

          372KB

        • memory/2580-44-0x0000000000400000-0x000000000045D000-memory.dmp

          Filesize

          372KB