Resubmissions

04-07-2024 17:22

240704-vxyavazeql 10

04-07-2024 17:19

240704-vv7rhazenr 10

Analysis

  • max time kernel
    144s
  • max time network
    127s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    04-07-2024 17:22

General

  • Target

    [DemonArchives]4c1ca9436c971190f7082f5c108a007b.exe

  • Size

    2.3MB

  • MD5

    4c1ca9436c971190f7082f5c108a007b

  • SHA1

    a0470142078e03bf83169e552a64cfab44e78161

  • SHA256

    09e2c5ca4563ed428e6605eb913334e0d6b5d54a71a78430f7e2ab04ee019f18

  • SHA512

    c8cec318444354e8629d605f6848550aeceed2b1c20c5dc7c6dc0d0115b42a5d9925ae970e799c8c383ca48d71f3a7626196c21ed3b211d81a8216d601d58ef4

  • SSDEEP

    49152:VtRTbTA8wMrztXdpuBkGZ+PyZAsQmPrx7tAwi2x8xp:9bTA8wMrz9mBrZ+PxsQmPrx7ty2x8v

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\[DemonArchives]4c1ca9436c971190f7082f5c108a007b.exe
    "C:\Users\Admin\AppData\Local\Temp\[DemonArchives]4c1ca9436c971190f7082f5c108a007b.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:3028

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCX4674.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

    Filesize

    2.3MB

    MD5

    739b62bf6f42f7d7bca3a77ec309e439

    SHA1

    bc02203c1ba3e720225ee5f26cb23ff8d101ad99

    SHA256

    133d425a8e5738b69e218ebc1bd2a4b7035365d8d7b21c4e8f81db5d81cc78f7

    SHA512

    ba81c352d45aabf2441977360988dcd36942d675811f92afb2e5b53ae2a06ab6aff44e05fe599d120a06cacd6b4120d98352bad78fe0b81c174eb2bc044cfe01

  • memory/3028-120-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-121-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-116-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-117-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-118-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-119-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-114-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-115-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-122-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-123-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-124-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-125-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-126-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-127-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/3028-128-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB