Analysis

  • max time kernel
    111s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    21-07-2024 08:02

General

  • Target

    907a4237931d319c4271ed6347936410N.exe

  • Size

    360KB

  • MD5

    907a4237931d319c4271ed6347936410

  • SHA1

    32d84019713b6b623da248dafad6fe5ceef418d2

  • SHA256

    967df8a76c3642cc2981d3eb40e153a53fdbf89daa93117f945e2d89cba6461b

  • SHA512

    15a73ba4278e84f399e1f480c5e43d0c330b26c25b7c88f34724c3b2eade179fa692454b87cd13b5e776e22818f68b6dc30ffcd419c2d3d771dfff0bd47b9cf4

  • SSDEEP

    6144:p731bdBaB+oWmUv6I8iWdz4utSTxMXFgBxxNQuHt1xwrWP0REqRKzQ6wx:p1bIWvD8jdz4utSTxww1xwrawXRLt

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\907a4237931d319c4271ed6347936410N.exe
    "C:\Users\Admin\AppData\Local\Temp\907a4237931d319c4271ed6347936410N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2556

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\RCXF3C6.tmp

    Filesize

    62KB

    MD5

    b126345317624479f78fbf30b3a1fe5a

    SHA1

    655c966bf7bbf96ee49c83062d30b9dba17d693c

    SHA256

    8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

    SHA512

    d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    683KB

    MD5

    7287c033c55c69c87ac8b21318f2328e

    SHA1

    c885b4a77b5e03837d0e136400e06644b0293542

    SHA256

    c392259fae3f96b2b9c767562cdd33ed62e0bf1d2e47492c78ee442af7b054db

    SHA512

    32619706b2368ecd892d54a875e275ac8fb79f1e2552a3ea7ff1e79dc495adf82208205be0eccef6935805933f6f2144c2fb1b75b687a63e16b696ce9a40defe

  • memory/2556-142-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-139-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-140-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-141-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-46-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-143-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-144-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-145-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-146-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-147-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB

  • memory/2556-148-0x0000000000400000-0x0000000000416000-memory.dmp

    Filesize

    88KB