Analysis

  • max time kernel
    149s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 10:47

General

  • Target

    d5eb87079b33587754cea6d4f0411b9e.exe

  • Size

    130KB

  • MD5

    d5eb87079b33587754cea6d4f0411b9e

  • SHA1

    436df1306e57d5ce5423c2927adcaa008e1dae42

  • SHA256

    13086d2cbcf0b0cb99f165562049f90326e0ca57b4b4b12701f393d15f08fa85

  • SHA512

    48023c89de4782bf7b7820f660d3f581a83d43ba712e8e9ea839316c38259ba59965fbab599f983c03d807e73a4d33aa7759c8b3cd4a5a7f2e0ad47cd463fc95

  • SSDEEP

    3072:qUboH8STGbBby9ILYmLttldTsuZVGtB6Aili9ckw6:qVVGbBbSgttldT3vGtBzicTw6

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe
    "C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2356
    • C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe
      C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe
      2⤵
      • Modifies WinLogon for persistence
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:4560
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$c44F8.tmp.bat
        3⤵
          PID:3432
        • C:\Program Files\Windows Media Player\svchost.exe
          "C:\Program Files\Windows Media Player\svchost.exe"
          3⤵
          • Executes dropped EXE
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:2500
          • C:\Program Files\Windows Media Player\svchost.exe
            "C:\Program Files\Windows Media Player\svchost.exe"
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Drops file in System32 directory
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of SetWindowsHookEx
            PID:3712

    Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Program Files\Windows Media Player\svchost.exe

            Filesize

            130KB

            MD5

            d5eb87079b33587754cea6d4f0411b9e

            SHA1

            436df1306e57d5ce5423c2927adcaa008e1dae42

            SHA256

            13086d2cbcf0b0cb99f165562049f90326e0ca57b4b4b12701f393d15f08fa85

            SHA512

            48023c89de4782bf7b7820f660d3f581a83d43ba712e8e9ea839316c38259ba59965fbab599f983c03d807e73a4d33aa7759c8b3cd4a5a7f2e0ad47cd463fc95

          • C:\Users\Admin\AppData\Local\Temp\$$c44F8.tmp.bat

            Filesize

            233B

            MD5

            f63cdfd0a8f3c10a9a870267482965b3

            SHA1

            59a4cc1ce534a8891b500eeb836fbab087e5dd1c

            SHA256

            b3d056cf7a6e08b9b35b84b325c29e0cdb5158e3736afad34cb13e84795d1680

            SHA512

            409a34d160639692d6b6c65eeeb894f598f34a5ef437a1a8fc223c52378097ebc9954907052bcff2ba650318e29773733956d320a4eaadb185c3e1706fc3c6a5

          • C:\Windows\SysWOW64\PDLL.dll

            Filesize

            70KB

            MD5

            6fad8497ad45422e9d472a8abc96aec2

            SHA1

            f286b93f5d27f98fcf0fe2d802843072f3e344fb

            SHA256

            dd0f0b18a13d37656c8ffc38ad4995cc7a37f885b039eba47b88986dcb2d5a16

            SHA512

            a8c62a443ffa2f8dc1f707360edb5c308aaa1a24edf9c2d4797b9df3ae8a88a73ae53ad5dc266172db57c1356671991f0786fc8072c4bc96f4d941ad9e3efae2

          • memory/2356-3-0x0000000010000000-0x0000000010072000-memory.dmp

            Filesize

            456KB

          • memory/2356-0-0x0000000010000000-0x0000000010072000-memory.dmp

            Filesize

            456KB

          • memory/2500-19-0x0000000010000000-0x0000000010072000-memory.dmp

            Filesize

            456KB

          • memory/2500-15-0x0000000010000000-0x0000000010072000-memory.dmp

            Filesize

            456KB

          • memory/3712-32-0x00000000027E0000-0x000000000282B000-memory.dmp

            Filesize

            300KB

          • memory/3712-36-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3712-16-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3712-35-0x00000000005E0000-0x00000000005FE000-memory.dmp

            Filesize

            120KB

          • memory/3712-20-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3712-22-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3712-23-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/3712-24-0x00000000005E0000-0x00000000005FE000-memory.dmp

            Filesize

            120KB

          • memory/3712-34-0x00000000027E0000-0x000000000282B000-memory.dmp

            Filesize

            300KB

          • memory/3712-30-0x00000000027E0000-0x000000000282B000-memory.dmp

            Filesize

            300KB

          • memory/4560-6-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4560-1-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4560-4-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4560-7-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB

          • memory/4560-14-0x0000000000400000-0x0000000000443000-memory.dmp

            Filesize

            268KB