Analysis

  • max time kernel
    150s
  • max time network
    150s
  • platform
    windows7_x64
  • resource
    win7-20240508-en
  • resource tags

    arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system
  • submitted
    01-06-2024 19:12

General

  • Target

    1cb7f9d9625a370f610454479eb9179eadf369440a6cd52fd38bb3988d2b5a75.exe

  • Size

    345KB

  • MD5

    5dca0fe8de14eaade8622d1fa7d889db

  • SHA1

    65a2901a1e37a67ade43411ef034a760e0c56b3e

  • SHA256

    1cb7f9d9625a370f610454479eb9179eadf369440a6cd52fd38bb3988d2b5a75

  • SHA512

    faddc6eb8e62ff4bd80a7ed8f5bd5a77dae15500bb2276cbab6690390b83bcabbb110d9d7c4f8a6f14b42d15e84b0e3ba3ccd69e13f1ce3c49c3a8364eafb173

  • SSDEEP

    6144:xYCmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw4W:dmWQa0a1IMVr9eMqbRzLuVucfb8ehbjX

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 38 IoCs
  • Drops file in Windows directory 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1cb7f9d9625a370f610454479eb9179eadf369440a6cd52fd38bb3988d2b5a75.exe
    "C:\Users\Admin\AppData\Local\Temp\1cb7f9d9625a370f610454479eb9179eadf369440a6cd52fd38bb3988d2b5a75.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2400
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\gahyqah.com

    Filesize

    23KB

    MD5

    4d18fffb13dcc23eafe5a8ee3814717e

    SHA1

    5788adf8d396b0f8c76bcfbd2ece3356cc37659c

    SHA256

    c5b5e620a7a9d65474e933ef341ef62d7ef48bd80588a6cef805b45a38957f01

    SHA512

    064eddb57dc13f34533c461b37abba801cbcedd6f4d0a8c7d7d6b15348f4043616c42bb00dc1beee083883bdd01878946e5a77dd6ec7007f4ddb26794fbbda60

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    4d170d35917a14d60a72f945bc658dbd

    SHA1

    5843c1c33631e09dd27dfe2f423325f85145239e

    SHA256

    c15d69671a8da3242c1fca98e3d8a19f29a13286f8b8ab5fce82a834c3183eca

    SHA512

    b0d2e76658414befb7ba17d604caa0061a90a77fbc243eb2c37aaf5fdec81c83d3b9e8764a62ac6f77b5c555ea5866f5b1506cbe76219e6f519bd243de4892da

  • C:\Program Files (x86)\Windows Defender\lysyfyj.com

    Filesize

    481B

    MD5

    d6fab69ad297f3529e4cdd9837fc7512

    SHA1

    925661ed2526f2c0ab69715200ba741ee6540468

    SHA256

    1e5546cb1d43bd33194352f5191676f0e6cd31b0dfabfe5c3e65328db87970b2

    SHA512

    236b17e6cafbb5eafb59f2d518d9f2463146835a4c01058ec311111d901524f0033d12aa3f6e4f8b0159e7a3c9108ca98cd6669876e858eb3e22ecfc688c4340

  • C:\Program Files (x86)\Windows Defender\lysyfyj.com

    Filesize

    481B

    MD5

    2512068519fe32cf1f349693ee3310e9

    SHA1

    910073dd22c61a91a609ca60689309b3ca39c2af

    SHA256

    80d054535c04756911f2817e7d3034a6cc0ca303f78c178eb94e884025d68270

    SHA512

    3808ea34df8fde9648952d634db307ed1e6375e0c3ca792de988255d21a15edb67299870a36a2c101786089826487e7402e3179651a157284f030b7ff28c93c5

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    81e21479bfecf4bacbdf1b71b1b4e49f

    SHA1

    267f8d8349b4eb28edb7f70035c1feb6a1349164

    SHA256

    6801175744b741188dd024d25fbd277a64bae81d4926a91db5268a41b32d78a3

    SHA512

    d07e284ca11590206fc057a5b8253c811da19e66ace5e2947878beacab0e95d735a94b904682ac5c0c473cc49d986a0607b1c081479289622f162cbf8e5d357b

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\qegyval.com

    Filesize

    457B

    MD5

    531ec87a0b2f9477a52d88b111d0d46a

    SHA1

    50a72e5752075309f91c062e0282a7e7cd1e751e

    SHA256

    4875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385

    SHA512

    07994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

    Filesize

    70KB

    MD5

    49aebf8cbd62d92ac215b2923fb1b9f5

    SHA1

    1723be06719828dda65ad804298d0431f6aff976

    SHA256

    b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f

    SHA512

    bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    344B

    MD5

    44532c69adcf09aca3a62f911c1254ce

    SHA1

    eac364deabbdf1588c86283d170f6893d6570920

    SHA256

    6064860c284ff053749214e2c1dd88755ccdffc9581ee81d757bba990512f42f

    SHA512

    a89f0f99e727ab731a4f2b1d26a29c4d2283a6809065bde37596f7cc167b489d4c6b9923fea297d1b869ca0c389c57a2d68747545ca81badc31e3b8ad8836b6e

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

    Filesize

    342B

    MD5

    2e28ca1cbb3e017f43e80c55dd5e3c77

    SHA1

    88041e17e89b954c551f07778243f515372ed31d

    SHA256

    31db0aee646eb1a4a68c1b423f962f38369d2808db36408d8f6f87f9088082ca

    SHA512

    ee54e47df2bfbb0a7e150ab1c8b3921b8e193dadb28514f0380de16c30a97358d6510948aab396af9b174deaa7c0d628b9eb1ff0ff509d825a51352526d59c8b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\52G8PVLC\login[2].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\IO0LJX84\login[3].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Users\Admin\AppData\Local\Temp\CabE8BC.tmp

    Filesize

    68KB

    MD5

    29f65ba8e88c063813cc50a4ea544e93

    SHA1

    05a7040d5c127e68c25d81cc51271ffb8bef3568

    SHA256

    1ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184

    SHA512

    e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa

  • C:\Users\Admin\AppData\Local\Temp\TarE8CE.tmp

    Filesize

    177KB

    MD5

    435a9ac180383f9fa094131b173a2f7b

    SHA1

    76944ea657a9db94f9a4bef38f88c46ed4166983

    SHA256

    67dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34

    SHA512

    1a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a

  • C:\Users\Admin\AppData\Local\Temp\TarE970.tmp

    Filesize

    181KB

    MD5

    4ea6026cf93ec6338144661bf1202cd1

    SHA1

    a1dec9044f750ad887935a01430bf49322fbdcb7

    SHA256

    8efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8

    SHA512

    6c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    345KB

    MD5

    e615e32e54879c10dde138d9f7c63abb

    SHA1

    01f333a659bb052cee194f820d15b4eb59cd4f4d

    SHA256

    53aee27466308f660f8dde32a0549abba8691b125f417fef522022c58b9d7738

    SHA512

    760de26c22687a868a4a2e43f736ee60b9f55ec7df4e154b43a90aaaae4d36655e82301802700f3114b2966ffe8d1caa50537eea80a128160a572a6816bb8dd2

  • memory/2360-51-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-40-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-73-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-72-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-71-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-70-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-69-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-66-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-65-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-64-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-63-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-62-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-61-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-60-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-59-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-58-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-57-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-55-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-54-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-53-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-52-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-75-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-50-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-49-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-48-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-47-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-46-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-45-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-44-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-42-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-41-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-74-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-39-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-68-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-37-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-36-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-56-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-34-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-32-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-43-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-33-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-76-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-205-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-77-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-78-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-67-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-38-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-35-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-30-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-28-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-27-0x0000000002210000-0x00000000022C2000-memory.dmp

    Filesize

    712KB

  • memory/2360-18-0x00000000004D0000-0x0000000000574000-memory.dmp

    Filesize

    656KB

  • memory/2360-2277-0x0000000002500000-0x0000000002501000-memory.dmp

    Filesize

    4KB

  • memory/2360-2276-0x00000000023F0000-0x00000000023F1000-memory.dmp

    Filesize

    4KB

  • memory/2360-2275-0x0000000002510000-0x0000000002511000-memory.dmp

    Filesize

    4KB

  • memory/2360-2274-0x0000000077C5F000-0x0000000077C60000-memory.dmp

    Filesize

    4KB

  • memory/2360-20-0x00000000004D0000-0x0000000000574000-memory.dmp

    Filesize

    656KB

  • memory/2360-24-0x00000000004D0000-0x0000000000574000-memory.dmp

    Filesize

    656KB

  • memory/2360-22-0x00000000004D0000-0x0000000000574000-memory.dmp

    Filesize

    656KB

  • memory/2360-16-0x00000000004D0000-0x0000000000574000-memory.dmp

    Filesize

    656KB

  • memory/2360-14-0x00000000004D0000-0x0000000000574000-memory.dmp

    Filesize

    656KB

  • memory/2400-12-0x0000000000E40000-0x0000000000E9C000-memory.dmp

    Filesize

    368KB