Analysis

  • max time kernel
    119s
  • max time network
    119s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/07/2024, 03:27

General

  • Target

    5b28bd9a87984b51377363270a990a30N.exe

  • Size

    3.4MB

  • MD5

    5b28bd9a87984b51377363270a990a30

  • SHA1

    bd796220966c1945a1e4a41f9dc0b1c59e0027e6

  • SHA256

    d87b73050431d06db5cae93ffa872fae0fdf114f238d73406445e84efead1ace

  • SHA512

    8d41b32c161416dd4acbe984e6ef191cc497a9851382a7265c88141b984f40b95d60cd94f9c33823ae6dad8d69eeff9dc1673e09167a81546a867b046df7321a

  • SSDEEP

    49152:5QtroF15IV4cZcvywlS8DVlvIVMQUiIKfTJPixHW7Mc1oUUScBDCV+rR5Iya:QoF1wGVACCVCkThix+MOoULcBHrvIya

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5b28bd9a87984b51377363270a990a30N.exe
    "C:\Users\Admin\AppData\Local\Temp\5b28bd9a87984b51377363270a990a30N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:5036

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCX9F00.tmp

          Filesize

          62KB

          MD5

          c28efdd834ed453de90e550a8052f4b6

          SHA1

          1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

          SHA256

          ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

          SHA512

          650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

        • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

          Filesize

          3.4MB

          MD5

          9eaeb90d6e746cc670dd24fdf64e4014

          SHA1

          6a78cc1314f39dbb7ae323f6edd9ea20820fdc33

          SHA256

          eecd7d52e92822bbc4be1d77f53491f9b183899c0940f5560fcf3798d7616104

          SHA512

          0d9794a80e773c03acf69ba0ef5d39cbae0f1de5f0d7310547501c090d3181f9730799763661ae7177cdb461dc1d3bb326aa78fef3705ce3bd1964fdc4f473e1

        • memory/5036-95-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-96-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-97-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-98-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-99-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-100-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-101-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-102-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-103-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/5036-104-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB