Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/07/2024, 02:02

General

  • Target

    ae8fa9f9f123324ff64971351d7ead3ac673b6e999271e2bced53ec5d5a577d5.exe

  • Size

    205KB

  • MD5

    2b4f8f1dbf363acf129651259a5120b8

  • SHA1

    7df7773fd46ef5d010e6afecd5778af3110084bd

  • SHA256

    ae8fa9f9f123324ff64971351d7ead3ac673b6e999271e2bced53ec5d5a577d5

  • SHA512

    b2f29cca360200191b93fd08f1d6ac711de87c171c90c16285c91de5d4fdbb460e5d1c182f136f6c10a2b54959062475ef87d090048419ef65b216cdde7e37a6

  • SSDEEP

    3072:47VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:+zHnMLm5GNGxHUhtnkdpHqTKzhh8i

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops desktop.ini file(s) 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 52 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ae8fa9f9f123324ff64971351d7ead3ac673b6e999271e2bced53ec5d5a577d5.exe
    "C:\Users\Admin\AppData\Local\Temp\ae8fa9f9f123324ff64971351d7ead3ac673b6e999271e2bced53ec5d5a577d5.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4600
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Drops desktop.ini file(s)
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3056

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    42KB

    MD5

    167609f3be9785fe74cd627d84fb0c2c

    SHA1

    fc7160e0580589de0fde8657fee43358bcc01b51

    SHA256

    98f531ab31f8bcd18cffdf432d8e89a87f50e9afb6ae5542a80f04135e192f64

    SHA512

    e1ce6ee1606f97dc58986e9ad1ff87da50b88ba69f0ca58845c0275e04ba572e8b588f4aa9b474bbc9f80634d606a06e6573605492aba19b4bd9dc85847bd982

  • C:\Program Files (x86)\Windows Defender\pupydeq.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\qetyhyg.com

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Program Files (x86)\Windows Defender\qetyhyg.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VRLMADU3\login[3].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\VRLMADU3\login[3].htm

    Filesize

    114B

    MD5

    e89f75f918dbdcee28604d4e09dd71d7

    SHA1

    f9d9055e9878723a12063b47d4a1a5f58c3eb1e9

    SHA256

    6dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023

    SHA512

    8df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0

  • C:\Windows\apppatch\svchost.exe

    Filesize

    205KB

    MD5

    6c96b327afcff371eb36a141ed4dc7e6

    SHA1

    18bba563511a4cf80987f93cd0b26819d20ea44e

    SHA256

    8d0d686d8381e7d5ac78ce272b14849fa756db0ae6488fe1fda34c25cfdc6244

    SHA512

    dd74a1b305a11eda78d0b9e981e4587ec89a81b4e71da9ac16d20f757ab42c32ab14e161ab579b0306dd5d6be69026f5e0eeff1d4a9d6b0e393aa4eb86b4f93a

  • memory/3056-53-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-51-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-19-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-20-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-24-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-22-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-78-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-79-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-77-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-76-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-75-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-74-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-73-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-72-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-71-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-70-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-69-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-68-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-67-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-66-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-65-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-64-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-63-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-62-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-61-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-60-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-59-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-58-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-56-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-55-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-54-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-12-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-52-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-48-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-16-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-49-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-50-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-47-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-46-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-45-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-44-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-43-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-42-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-41-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-40-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-39-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-38-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-37-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-36-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-34-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-33-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-30-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-32-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-31-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-29-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-28-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-27-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-26-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-57-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-35-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-25-0x0000000002FC0000-0x0000000003072000-memory.dmp

    Filesize

    712KB

  • memory/3056-17-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/3056-18-0x0000000002DD0000-0x0000000002E74000-memory.dmp

    Filesize

    656KB

  • memory/4600-0-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB

  • memory/4600-1-0x0000000002230000-0x000000000227F000-memory.dmp

    Filesize

    316KB

  • memory/4600-15-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4600-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/4600-14-0x0000000002230000-0x000000000227F000-memory.dmp

    Filesize

    316KB

  • memory/4600-13-0x0000000000400000-0x000000000048A000-memory.dmp

    Filesize

    552KB