Analysis

  • max time kernel
    109s
  • max time network
    110s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-08-2024 11:32

General

  • Target

    5a875beafded7bc4e2bc201dc7d20bc0N.exe

  • Size

    244KB

  • MD5

    5a875beafded7bc4e2bc201dc7d20bc0

  • SHA1

    5941d10d291c7c80b0d54d255a0e24d38aa2a7cd

  • SHA256

    ccf74829e0681045497a49edba7a42b5c6b18147a5b3cad6a797cae363822581

  • SHA512

    14a8e8a425eb254264bd65b19e4e74d7cb4571bebf70345e0cece519644ea636a7462362314cb46d00b089944c66eb9aa993cf5a9554064e1179b03c88750ebc

  • SSDEEP

    6144:sEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:5Aylvv5YRwh9HYd61xhmX

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a875beafded7bc4e2bc201dc7d20bc0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5a875beafded7bc4e2bc201dc7d20bc0N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1524
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3644
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 824
        3⤵
        • Program crash
        PID:4616
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3644 -ip 3644
    1⤵
      PID:4180

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\apppatch\svchost.exe

      Filesize

      244KB

      MD5

      4bba72f05b98706088d520261844109f

      SHA1

      276c8c4b5be8ed36bb6987f7e287b5e0e2fedae8

      SHA256

      6cb5b918492f7569a910d467af6738e8fccb58bea667d27db097e61bf6cbf3b5

      SHA512

      d49d12a5e12d880971ec511ff781c7183941d3219f71bfa0cbbb5ab86b3e63ae0ae70763d8069d5fd3d0abc52d425e09c6fca81c013400dcfd1172fba5758f97

    • memory/1524-0-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/1524-1-0x0000000002200000-0x0000000002268000-memory.dmp

      Filesize

      416KB

    • memory/1524-2-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/1524-14-0x0000000002200000-0x0000000002268000-memory.dmp

      Filesize

      416KB

    • memory/1524-15-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/3644-16-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/3644-13-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/3644-17-0x00000000027A0000-0x00000000027EA000-memory.dmp

      Filesize

      296KB

    • memory/3644-18-0x0000000000400000-0x0000000000469000-memory.dmp

      Filesize

      420KB

    • memory/3644-19-0x0000000002B40000-0x0000000002B98000-memory.dmp

      Filesize

      352KB

    • memory/3644-21-0x0000000002B40000-0x0000000002B98000-memory.dmp

      Filesize

      352KB

    • memory/3644-23-0x0000000002B40000-0x0000000002B98000-memory.dmp

      Filesize

      352KB

    • memory/3644-26-0x0000000002B40000-0x0000000002B98000-memory.dmp

      Filesize

      352KB