Analysis

  • max time kernel
    136s
  • max time network
    140s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    09-04-2024 19:26

General

  • Target

    3e0f59cb649699c6004139763a123b5c.exe

  • Size

    5.9MB

  • MD5

    3e0f59cb649699c6004139763a123b5c

  • SHA1

    33d1b61ec90d7e747ab03cc3563358bcbf73d1cc

  • SHA256

    af1e9014d4c93ccaf1951775e742a2f3ab22aa8c670dc2dab42c4a576e360b55

  • SHA512

    7780b561ecbc4b7d3fbddc677866052a1331c7b9dd451349ef431aacff4873e02bfb722323af3a433a403108f743fb3f68f85427ea65b1471e463823fc7db43e

  • SSDEEP

    98304:dG6q0HqBQgN71haEmfJ7vl003/VfBtaiq2KveJddj8J7Em9S7MxWBvEe0aRKCeAl:A6q0HkQgN1DmfJLO03/Vnaiq2L8dET6S

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3e0f59cb649699c6004139763a123b5c.exe
    "C:\Users\Admin\AppData\Local\Temp\3e0f59cb649699c6004139763a123b5c.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • Suspicious behavior: EnumeratesProcesses
    PID:1240

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX58EE.tmp

    Filesize

    5.9MB

    MD5

    4d98dcee1bfaee6b1e48efad371af4b8

    SHA1

    dfaf735d8c50c621ef974f9b3f27d85ed24c649d

    SHA256

    e9fbec5209aa746c6e2a8044172133668eaad214371617ab0dcbc3787b4892b8

    SHA512

    19c4fdab3737e58a8a778ca5514db7e85cc1c15080644707b9e345ea5a4f2ed43891fc994b059adb2ea74e4737e5c25cc2285a6392fd2ecf355197712f312897

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    5.9MB

    MD5

    3e0f59cb649699c6004139763a123b5c

    SHA1

    33d1b61ec90d7e747ab03cc3563358bcbf73d1cc

    SHA256

    af1e9014d4c93ccaf1951775e742a2f3ab22aa8c670dc2dab42c4a576e360b55

    SHA512

    7780b561ecbc4b7d3fbddc677866052a1331c7b9dd451349ef431aacff4873e02bfb722323af3a433a403108f743fb3f68f85427ea65b1471e463823fc7db43e

  • memory/1240-9-0x0000000002B00000-0x0000000002B01000-memory.dmp

    Filesize

    4KB

  • memory/1240-0-0x0000000000400000-0x0000000000D43000-memory.dmp

    Filesize

    9.3MB

  • memory/1240-8-0x0000000002AF0000-0x0000000002AF1000-memory.dmp

    Filesize

    4KB

  • memory/1240-7-0x0000000002AE0000-0x0000000002AE1000-memory.dmp

    Filesize

    4KB

  • memory/1240-2-0x0000000002A90000-0x0000000002A91000-memory.dmp

    Filesize

    4KB

  • memory/1240-6-0x0000000002AD0000-0x0000000002AD1000-memory.dmp

    Filesize

    4KB

  • memory/1240-5-0x0000000000400000-0x0000000000D43000-memory.dmp

    Filesize

    9.3MB

  • memory/1240-4-0x0000000002AA0000-0x0000000002AA1000-memory.dmp

    Filesize

    4KB

  • memory/1240-3-0x0000000000400000-0x0000000000D43000-memory.dmp

    Filesize

    9.3MB

  • memory/1240-1-0x0000000000EE0000-0x0000000000EE1000-memory.dmp

    Filesize

    4KB

  • memory/1240-99-0x0000000000400000-0x0000000000D43000-memory.dmp

    Filesize

    9.3MB

  • memory/1240-100-0x0000000000400000-0x0000000000D43000-memory.dmp

    Filesize

    9.3MB

  • memory/1240-101-0x0000000000400000-0x0000000000D43000-memory.dmp

    Filesize

    9.3MB