Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    19/03/2024, 12:00

General

  • Target

    d60e7bf28edccc47e2ea1b1ae1b972b1.exe

  • Size

    40KB

  • MD5

    d60e7bf28edccc47e2ea1b1ae1b972b1

  • SHA1

    53914d2aeb4c891ce5e4f4016d4c1f17117b399e

  • SHA256

    5f7e4bfebbf29ec1f2f6d96bdaa460ea007360d9528f44d77cdaf0ac15a29155

  • SHA512

    75bbfa5526e8e04523d4ec6e2ea886c0b6c4f0f028846a2deaa5e410269ed591884ca1aa4237caad347bd1c452a8968378edcf389643672ce33ed79e5042e6af

  • SSDEEP

    768:/jgJaQaACaQUU2szuMIl+GKR7U++f5dTu4fZSsAui1ZKbY6Nl:LgJRaJUU2ssO7Uzfr6geuiebY+l

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Drops file in System32 directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d60e7bf28edccc47e2ea1b1ae1b972b1.exe
    "C:\Users\Admin\AppData\Local\Temp\d60e7bf28edccc47e2ea1b1ae1b972b1.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Loads dropped DLL
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of SetWindowsHookEx
    PID:5056

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\dab1.dll

          Filesize

          40KB

          MD5

          61c20bef66abc83546c22a3a07474b11

          SHA1

          e8fd393dca17b7c353d0bdeba7d3d6d9f00035b4

          SHA256

          f78aa5d3c131f2ee5e22be9efc51a157f6c5317f0db2065c0bc92f777b78163f

          SHA512

          b8d7acf009412c17c8b38a1545a01334460e6de600dcb2560c62fb01cb19a32bf2404f63f4171e3e62c8da295aba3d2abca2e714edc9aec01a5fb60b14054b75

        • memory/5056-0-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/5056-5-0x0000000002160000-0x0000000002170000-memory.dmp

          Filesize

          64KB

        • memory/5056-8-0x0000000000400000-0x0000000000436000-memory.dmp

          Filesize

          216KB

        • memory/5056-9-0x0000000002160000-0x0000000002170000-memory.dmp

          Filesize

          64KB