Analysis

  • max time kernel
    100s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240709-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/07/2024, 00:49

General

  • Target

    75acde9221d6b38c8a2547d8bf9202f0N.exe

  • Size

    15KB

  • MD5

    75acde9221d6b38c8a2547d8bf9202f0

  • SHA1

    3f966428543cc1bcb187a8cafc516322c97fc202

  • SHA256

    ec8d9ef8d99f6ec9a664dfbcfd924815c7e383a1dad88c4797f8baa00ca3a34b

  • SHA512

    cecaf96763370d38fb6d67acf2907c8bdf01e5cc68435e6dc5754996ff6ddcf6d657d6e5203b63152e756a85fc0772b3eb9d64437a046375795db43d8bcf4531

  • SSDEEP

    384:kYho7iQAtR/zv87udVieokSSrOtEaq+hciduuLT+tkUGEg:uATTAud/atJTLLKSUGEg

Malware Config

Signatures

  • Adds policy Run key to start application 2 TTPs 1 IoCs
  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in System32 directory 3 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:3532
      • C:\Users\Admin\AppData\Local\Temp\75acde9221d6b38c8a2547d8bf9202f0N.exe
        "C:\Users\Admin\AppData\Local\Temp\75acde9221d6b38c8a2547d8bf9202f0N.exe"
        2⤵
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:744
        • C:\Users\Admin\AppData\Local\Temp\LYLOADER.EXE
          C:\Users\Admin\AppData\Local\Temp\LYLOADER.EXE "C:\Users\Admin\AppData\Local\Temp\75acde9221d6b38c8a2547d8bf9202f0N.exe"
          3⤵
          • Adds policy Run key to start application
          • Deletes itself
          • Executes dropped EXE
          • Drops file in System32 directory
          • System Location Discovery: System Language Discovery
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:4528

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\LYLOADER.EXE

      Filesize

      11KB

      MD5

      e5a44f73aca316bb65072d6f8fc76e1c

      SHA1

      dd0cca6f2279ff07b35c2e8631b030169e699abe

      SHA256

      646c9ebf22bd8f944628cc33ad45700b87fd3fbc0fe6304dbfcff5c3045b56f8

      SHA512

      235cefd8cd1f3ea8081f52f0a9aa076c73b47e0026bcac7045f091e2e8c91f3a2eae70c2391ad3cf974f84da48801587c7b0a242d96677297e8dc5d245d25332