Analysis

  • max time kernel
    120s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    03-08-2024 03:53

General

  • Target

    46db3e304e9640f9661832428bdc15f0N.exe

  • Size

    204KB

  • MD5

    46db3e304e9640f9661832428bdc15f0

  • SHA1

    3de5ea13983e9260c6c45fb2c10df414992256d4

  • SHA256

    008f00ab3faae0a08cc6bed2164bee392f36b5bf2b387f56856b573cab42f5de

  • SHA512

    d30762e3928a503012a37e4d3c82fd137bfb2cae41abfbb8e4410aa04025ce6f218d21840eaed5956298ea1d326d5b6a70c2732770b346650cdcd3e14d9865c1

  • SSDEEP

    3072:HaSdR9c1/fuWL0AjMilpCOT+kICtApWFK1WHk25weLcKznxbQFFNj6QU:H7oFuhAwM+kICeseWEEPznxbJ

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Program Files directory 32 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\46db3e304e9640f9661832428bdc15f0N.exe
    "C:\Users\Admin\AppData\Local\Temp\46db3e304e9640f9661832428bdc15f0N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2432
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2784

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\Windows Defender\galynuh.com

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Program Files (x86)\Windows Defender\galyqaz.com

    Filesize

    41KB

    MD5

    c12e95b4a2bf40b826f09ed0dcc147bf

    SHA1

    daad276a9851dccf792fe5cf327a82557d80e11f

    SHA256

    1d5e9a3fff75de9add09d852ddcac3085b05bf5b2523f4218514c5a3a4066c63

    SHA512

    1c033cf74bc624d736b6e60039cff2c5936bd0a9098ab3b5d2e7694b4d315414477a47197a5b90d55dba76a742257bed4b0381b5bb10eaabe24bffaf28414e57

  • C:\Program Files (x86)\Windows Defender\lyrysor.com

    Filesize

    114B

    MD5

    bfde1e9e9c32c1681a16139450c6909d

    SHA1

    7e669b927e6a75a10a0ca29e38e58ddcb49b725e

    SHA256

    e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a

    SHA512

    781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396

  • C:\Program Files (x86)\Windows Defender\lysyfyj.com

    Filesize

    481B

    MD5

    ad5e0892d6dbf3ca9c431e69d4c70bbe

    SHA1

    fa94f8a853db957ddce99989333310353a02a1a0

    SHA256

    6af8f224d4c9dd80bccd3bb80356f40a7a7b22b31f304970b6163bd92d31e210

    SHA512

    b169168920c32b6adb84e76781078514a9d4a5f7522983134ef7485b167dc859cb5df197d4bf6f5b8657ee8917f36dc864c88dc72bcf1878e66c2f0dc0d5a70b

  • C:\Program Files (x86)\Windows Defender\lyxynyx.com

    Filesize

    1KB

    MD5

    1c3a942c0b44ae69bb9f05bcc1fd3065

    SHA1

    832fa9a27093eb636253c36658212baaa42130ac

    SHA256

    de92ad2933d432ac8a00804c873937305b88e6c648e6144052be345fc4df0000

    SHA512

    46fdfa810da56ae4e5311896f045296b44b818cb41c4bfa5656388a99de85e5b2a143cf7b3b5d46c33145d061ef481acb47fcf46dc63f327adbd88b5d457220b

  • C:\Program Files (x86)\Windows Defender\vofycot.com

    Filesize

    24KB

    MD5

    15a8272444ea922b39b9d5abd6287bb7

    SHA1

    5e70a6b57996e3620a9dbd7c76164519aa04010c

    SHA256

    23121316d7692212b54ab5d4735948ed32148d03911875780269cd4829d77034

    SHA512

    70af052da1888810580214302dddb6864a2db54c79a9935d699aa1cecc44f364891d24461039635e0fe1a1ed84e8f1c7b2be9d550bc700bac792168a8c6c3540

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\login[3].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • \Windows\AppPatch\svchost.exe

    Filesize

    204KB

    MD5

    41e163318bbfbf9ba12b70e5bcff02a7

    SHA1

    97418a31f929dd72c3f1e05d42add3ed8fefef58

    SHA256

    cd5efa2f100072de8ea7a418b23eab4cf03533173583a115503021bad18f1d40

    SHA512

    0419d72114adedb0f0585afee673adb7d1a317a8f7104fb6463a75756731664dd3ded8c66aa77b6e5a4e12c5d8ed7fad01c6ea025c5513ab2403b4d11e9fc07a

  • memory/2432-0-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2432-17-0x0000000000220000-0x000000000026F000-memory.dmp

    Filesize

    316KB

  • memory/2432-18-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2432-16-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2432-2-0x0000000000400000-0x000000000045C000-memory.dmp

    Filesize

    368KB

  • memory/2432-1-0x0000000000220000-0x000000000026F000-memory.dmp

    Filesize

    316KB

  • memory/2784-71-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-63-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-28-0x0000000000520000-0x00000000005C4000-memory.dmp

    Filesize

    656KB

  • memory/2784-26-0x0000000000520000-0x00000000005C4000-memory.dmp

    Filesize

    656KB

  • memory/2784-24-0x0000000000520000-0x00000000005C4000-memory.dmp

    Filesize

    656KB

  • memory/2784-34-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-36-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-38-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-45-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-51-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-84-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-83-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-82-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-81-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-80-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-79-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-77-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-76-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-75-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-74-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-73-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-72-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-33-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2784-70-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-69-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-67-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-66-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-65-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-64-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-30-0x0000000000520000-0x00000000005C4000-memory.dmp

    Filesize

    656KB

  • memory/2784-62-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-61-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-60-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-59-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-58-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-57-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-56-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-55-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-54-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-53-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-52-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-50-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-49-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-48-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-47-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-46-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-44-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-43-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-78-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-42-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-68-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-41-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB

  • memory/2784-32-0x0000000000520000-0x00000000005C4000-memory.dmp

    Filesize

    656KB

  • memory/2784-22-0x0000000000520000-0x00000000005C4000-memory.dmp

    Filesize

    656KB

  • memory/2784-21-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2784-20-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2784-19-0x0000000000400000-0x0000000000487000-memory.dmp

    Filesize

    540KB

  • memory/2784-40-0x0000000002410000-0x00000000024C2000-memory.dmp

    Filesize

    712KB