Analysis

  • max time kernel
    118s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    26/07/2024, 02:32

General

  • Target

    596f6670e9fc25b6c2cfa1954b5b8f40N.exe

  • Size

    2.3MB

  • MD5

    596f6670e9fc25b6c2cfa1954b5b8f40

  • SHA1

    1d91d69d466d0551e9eddcb169d1ed39986e4558

  • SHA256

    00c983e84c2663577e8d9d98735c884e9c0d864fbd0796672e4500a99420b837

  • SHA512

    04829c4efc3f2d7d0e39a012eb6c5be531c535424946610647e0761923b81349d051c373431e9c32943c20e52d8a0b69ac878e5475ca9e1499d8b9946624f05a

  • SSDEEP

    49152:5fbLMWS1RquxmTEBRHgD8mDZtT7fF+yRNsQrqdyECFGROFBSugVKrvY8t4VMw:RMWS1Aumh8mDZtT7fAQu8EgF7rgpVMw

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\596f6670e9fc25b6c2cfa1954b5b8f40N.exe
    "C:\Users\Admin\AppData\Local\Temp\596f6670e9fc25b6c2cfa1954b5b8f40N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:1756

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCXE542.tmp

          Filesize

          62KB

          MD5

          c28efdd834ed453de90e550a8052f4b6

          SHA1

          1b4bd9e6b5254afdffa1d67e4f7f41fd320baee3

          SHA256

          ef1d62466f858e8f95d22c09679542c14ed2e711b64c7c75f5dd9edbd6da0ce3

          SHA512

          650ddc81119bf722a1af9ad01b5b76997b7cdcd075ea1a34f60ddc14902f1d0238eb8c272e83cefa2ee9f840097daedbe230049a1e7a7c1427ab9fcab30c1d47

        • C:\Windows\SysWOW64\xdccPrograms\7zG.exe

          Filesize

          2.3MB

          MD5

          159cc5943223c9d3ce973bcd1fa85969

          SHA1

          b6ccc099a5bc3b7612a8fbc614564bd5af243e3b

          SHA256

          94c259a22a62c415711750286c3f146bdce0ec83be0d7068010659359cb06d7e

          SHA512

          49a53108363f4956468ccdf9d85cc392348a1dcc2207fe34a952ec8c0671a160f2f02e09753d5a94e27cdcb4a06b680c6c4067d42e7df5cede55d841dcebdb55

        • memory/1756-105-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-102-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-103-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-104-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-101-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-106-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-107-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-108-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-109-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-110-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB

        • memory/1756-111-0x0000000000400000-0x0000000000416000-memory.dmp

          Filesize

          88KB