Analysis

  • max time kernel
    121s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    09-07-2024 01:51

General

  • Target

    8db7aa846a4a55d92495da7bd4750e74245bc8e919aef72053e3d1e8314c1903.exe

  • Size

    78KB

  • MD5

    112215cb97b5f3c64c402c63b9b50e7d

  • SHA1

    38b7bdfb722c6d55acadcdc3ef50fd53ea9e8293

  • SHA256

    8db7aa846a4a55d92495da7bd4750e74245bc8e919aef72053e3d1e8314c1903

  • SHA512

    0274a80f3a8471954eefe54b8d28e243a0c626e84c7384ebc4bb7026b244f3c163d49c81c88c28161d56ec5f3fde533bc704be844aca4920e56c609ddaadd544

  • SSDEEP

    1536:abSshapMJgKJUuxGmfJPtOgqm1s/XZSWcH4:K25KJFjfJPtOgqm2/XZXR

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 9 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8db7aa846a4a55d92495da7bd4750e74245bc8e919aef72053e3d1e8314c1903.exe
    "C:\Users\Admin\AppData\Local\Temp\8db7aa846a4a55d92495da7bd4750e74245bc8e919aef72053e3d1e8314c1903.exe"
    1⤵
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1832
    • \??\c:\users\admin\appdata\local\temp\winlgon.exe
      c:\users\admin\appdata\local\temp\winlgon.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2676
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2676 -s 256
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2780
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 1832 -s 204
      2⤵
      • Program crash
      PID:2532

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\winlgon.exe

    Filesize

    78KB

    MD5

    3951ad481e4095d098a65ce794779a5a

    SHA1

    7d7666e8ab404a5d5fe26454f5bb58284120ef0f

    SHA256

    9c096e49ac958eefa1b5b53e23b0f632e703cd11e0f5e644954023abb97643bb

    SHA512

    7f09ef80efe0eab0c00e88dc14da14c5fdf3cec104625a7f9c443d7a9fa586c2f19f3b3dac9d2b98b88637e28cd78157597e6292fdb006ab7a27941fd3d13a70