Analysis

  • max time kernel
    149s
  • max time network
    150s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    23-07-2024 23:56

General

  • Target

    8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe

  • Size

    3.4MB

  • MD5

    796ddfcacf1b60509ba851ad6a06f52e

  • SHA1

    c85b456b732dd4aec1840b47911280245f70bb0e

  • SHA256

    8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae

  • SHA512

    ade8f015f95a97201cb09df1c2deec44167afc70986911d7f616eac14729b12f7a109f47c70ec208bbbc7992aaf757822efb1af2f7c285b812da1d14b28f687b

  • SSDEEP

    98304:4Y3clhWcS2oXsgXc6X/D/IIhhXqeIDCi39r4O/ix3g+IE6O:8WcNoXua/DjXqjDT90iOoE6O

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

Processes

  • C:\Users\Admin\AppData\Local\Temp\8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe
    "C:\Users\Admin\AppData\Local\Temp\8854b75d96e13a1aedd219e71ceb9ba5c5e72a25000651821d99aeee9b98c3ae.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    PID:3064

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\SysWOW64\DC++ Share\jabswitch.exe

    Filesize

    74KB

    MD5

    79f79b8265359f3260356aadc610eb25

    SHA1

    d43af60dfe8573369c873dc062ffa9149b4e009b

    SHA256

    a0657bf634615fa6021487f80ca36aca350ae089430cf4db427fbb385ba7e939

    SHA512

    06a00de59b3099003871643ada035ddd38d28c91281ec9fe9401a9679e4707612796e558d382bae546847892fd250ff7995581b94f5d2895ca73167c002fcb4d

  • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

    Filesize

    3.5MB

    MD5

    33f199e99b2efde8f322428c04e77203

    SHA1

    c2de29e2efe21dc00b4979a19476ec838697fd6e

    SHA256

    7c9f2f18366955f179a90a4149bed32e4e84abbf9dcd6fdd2c985782022d4a4a

    SHA512

    8593dca280657284da07d468e9345b985cae1679c3b6ffed6678c42eacb7271437131b59aa64b50948eb74855d448e191b21ec7ea2dbffb42afc67d691cbd202

  • memory/3064-93-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-94-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-95-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-96-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-97-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-98-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-99-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-100-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-101-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB

  • memory/3064-102-0x0000000000400000-0x0000000000417000-memory.dmp

    Filesize

    92KB