Analysis

  • max time kernel
    151s
  • max time network
    154s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    23-05-2024 02:22

General

  • Target

    ba35a2e10c6f8743fae39f1565a857a5970df2d178a0909c7aca78a195104b02.exe

  • Size

    205KB

  • MD5

    58a0cff675a2557fef2a35bae0f50820

  • SHA1

    8cd44a53cefe634fd2abd803526feace6145f831

  • SHA256

    ba35a2e10c6f8743fae39f1565a857a5970df2d178a0909c7aca78a195104b02

  • SHA512

    16c1c18472d30c666d4b63166d765a24d32513f8211bbfea3ff8a34503b8e8b9fcfec8238ea84496bc0e769aa53010012724184344f7bca038b7eceb818fdbb8

  • SSDEEP

    3072:y7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:ozHnMLm5GNGxHUhtnkdpHqTKzhh8i

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 36 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ba35a2e10c6f8743fae39f1565a857a5970df2d178a0909c7aca78a195104b02.exe
    "C:\Users\Admin\AppData\Local\Temp\ba35a2e10c6f8743fae39f1565a857a5970df2d178a0909c7aca78a195104b02.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1776
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2356

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    8702bd3155f7f5603817640360c34fe6

    SHA1

    0f79a29d577aa9683cd3da033bb05c7d966ff2ec

    SHA256

    5f4751823004be1f19637d698a66589200c13e1f05c80e5e6e781c44abe7a600

    SHA512

    19b658a76f2b244626cb7bd8cf9881caaddc7201850437353b650c9f916ae24545080805aa646a037c0b553e7f879af4a5de779be87032a603cc0bb6a3387670

  • C:\Program Files (x86)\Windows Defender\lysyfyj.com

    Filesize

    481B

    MD5

    9284ca196b3ee0331049c46389741d0e

    SHA1

    9efad2a23fa777725c32cd92beafc5ab8de8e8a8

    SHA256

    8efad10070aebac7abfa6ffde7c4479d7c9a06d8b466a0780069c58280b21138

    SHA512

    2600c98874932499b359605ff05ea6dd71180ad4efbfa1fa5bd10d4c9cfdc1979ab95ff8e9bf193cb530b74839e00b274c46599197fe6dbf355c67b2a1a3c09e

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    67588f9f6629c4d99f6472d461d8c0a8

    SHA1

    dd10916b872f03277ef614c8225aaa6040cd11ee

    SHA256

    c1d1daf63e4b5163804132840c792b65e89658fdea656857ef7751e12af0e102

    SHA512

    a49e7ac6e90dbd27866c0a39780f413eb2cfaaf767dd4417c33540e113a432f597b11859600500a65681d7c1845cca77b640b89be2c091db12546c8ecf25fc34

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\qegyval.com

    Filesize

    457B

    MD5

    531ec87a0b2f9477a52d88b111d0d46a

    SHA1

    50a72e5752075309f91c062e0282a7e7cd1e751e

    SHA256

    4875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385

    SHA512

    07994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1

  • C:\Program Files (x86)\Windows Defender\vofycot.com

    Filesize

    23KB

    MD5

    f5966632b8e709e05956b84bca837173

    SHA1

    dc847875c07e23fbcf9d7426f0a3a1c53d15ba1c

    SHA256

    a279b1c76144218effd47c9c5b884a07a1f521d3a756320031d41584d037709e

    SHA512

    b133002cae3dea1ffea2915075a1608f8acf748c528a676e6673fecb954e508d9d8344c3e0fc3895d715728efd9cf884520894806706e15635d65b34c3f5b897

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    1KB

    MD5

    a266bb7dcc38a562631361bbf61dd11b

    SHA1

    3b1efd3a66ea28b16697394703a72ca340a05bd5

    SHA256

    df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e

    SHA512

    0da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    aa60c5ff2cda765834cee14e3a7ab1aa

    SHA1

    6d93b0b036e029458cdd5ee6d532bab843dc5089

    SHA256

    5ac49ecda06ef060e71061f95342931993cb654ee6a215bdf54bb6c6620cd169

    SHA512

    6e528cafd47a5722a4b2f1f54ed57f7fe46c1c23823a58e87fdf2cfe10fa0b0e461703b5a7803146577627fb6dd05d464575b34106c7a746166851e8390f4231

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357

    Filesize

    242B

    MD5

    be4dd71bf311c4b831c7338ddd6b2d96

    SHA1

    bd755f8dcffce7e60fa670217b091fc411bd9a08

    SHA256

    488c0eb2cf5a32474bba154a8cb7c58f6143fe2021e28e62b8eacaa08b25c1e4

    SHA512

    265fe57e3aca6aae2bc6c74c269bb7d9757bc4429a4fdc62721b822b595d0e1d34434722a287635d63654c4560a00b54b267f193e24763c8531e234d2342f299

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\login[3].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\Cab908E.tmp

    Filesize

    65KB

    MD5

    ac05d27423a85adc1622c714f2cb6184

    SHA1

    b0fe2b1abddb97837ea0195be70ab2ff14d43198

    SHA256

    c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d

    SHA512

    6d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d

  • C:\Users\Admin\AppData\Local\Temp\Tar90B0.tmp

    Filesize

    171KB

    MD5

    9c0c641c06238516f27941aa1166d427

    SHA1

    64cd549fb8cf014fcd9312aa7a5b023847b6c977

    SHA256

    4276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f

    SHA512

    936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06

  • C:\Users\Admin\AppData\Local\Temp\Tar924C.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • \Windows\AppPatch\svchost.exe

    Filesize

    205KB

    MD5

    a0b4ad3461ba0b94bce2a2351bb5fb3d

    SHA1

    2e9037b5a247b1177098b68f1b9f311fb265faf6

    SHA256

    ef623c9b227255771ae8bf89cf56d3a35dea175cf20508ec4914b101f8b3ffea

    SHA512

    02fdfdbae004049a83329887405fa08a247ada7a9eb7c5a2f20240a71eb19e5e32ed0d588d58e865d14a683d0ec9332de3fe1e64c14218f196453fd11108af36

  • memory/1776-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1776-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1776-1-0x0000000000310000-0x000000000035F000-memory.dmp

    Filesize

    316KB

  • memory/1776-18-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/1776-16-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/1776-17-0x0000000000310000-0x000000000035F000-memory.dmp

    Filesize

    316KB

  • memory/2356-62-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-48-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-42-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-78-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-76-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-77-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-83-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-81-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-80-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-75-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-73-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-72-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-71-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-70-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-68-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-67-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-65-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-64-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-34-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-61-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-59-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-58-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-57-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-56-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-54-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-53-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-51-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-50-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-47-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-43-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-46-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-40-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-84-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-82-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-79-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-74-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-69-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-66-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-63-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-60-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-55-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-52-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-49-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-38-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-36-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-22-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2356-33-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2356-24-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2356-26-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2356-28-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2356-32-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2356-30-0x0000000000490000-0x0000000000534000-memory.dmp

    Filesize

    656KB

  • memory/2356-21-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2356-20-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2356-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/2356-45-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-44-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2356-41-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB