Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240705-en
  • resource tags

    arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system
  • submitted
    02/08/2024, 09:12

General

  • Target

    838277bbb4a21e7bbd263ca79d1da950N.exe

  • Size

    1.7MB

  • MD5

    838277bbb4a21e7bbd263ca79d1da950

  • SHA1

    29e73ac8531669ecfa9cb046c26ef5c310af4813

  • SHA256

    8bb02be5f0a06d5cd19ec52be40e52499a0df669cca52282c84363985ea3e778

  • SHA512

    1640f610fa2ced77c34e3e7467bf1832f03653ed738e698cef0263dceab1d4e3daaa181b9f78f54385c7efe857501fbacb6fe5663d2df8dfc04401b9c0f77aa5

  • SSDEEP

    49152:5Iw3l1Z7gFikqZV0Qoyd/pqZ2GLAm9FJyix:Cw1ng0kqP7oyd/SLAmDkix

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Drops file in System32 directory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\838277bbb4a21e7bbd263ca79d1da950N.exe
    "C:\Users\Admin\AppData\Local\Temp\838277bbb4a21e7bbd263ca79d1da950N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Drops file in System32 directory
    PID:2708

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\SysWOW64\DC++ Share\RCX5C65.tmp

          Filesize

          62KB

          MD5

          b126345317624479f78fbf30b3a1fe5a

          SHA1

          655c966bf7bbf96ee49c83062d30b9dba17d693c

          SHA256

          8723d2d97d52f6d3b63968594c93bf2c5b5300b306c9670be4616cb134964301

          SHA512

          d0be6d608b5f4e482287d16e6587e00be1b4390f78efc3ce63008f99be7358e65f0eef9eba330d845462b64fa7a86cc3f1395b863ad0f8d01c0b790fc2f4c02d

        • C:\Windows\SysWOW64\xdccPrograms\7zFM.exe

          Filesize

          1.7MB

          MD5

          c2af93ccb94b5b56b20d7ca3f5e1d9fa

          SHA1

          8f9c8dccf69884285341a1d9a04e7278639d4b0d

          SHA256

          24bf5ac26c5d9c05a7a31b0f55e7a639ce7d2c3a0bdb4b72a6fe97476d48a045

          SHA512

          cb4cf0c28a815fc0767aebc897c6bdd4f572d99a14eca25f62d25d78e7a4fb8220008758b4f29c0a920b06b52f692e68d5bc613cc00021fc2804de9f96de2b1a

        • memory/2708-115-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-112-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-113-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-114-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-111-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-116-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-117-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-118-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-119-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-120-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB

        • memory/2708-121-0x0000000000400000-0x0000000000417000-memory.dmp

          Filesize

          92KB