Analysis

  • max time kernel
    146s
  • max time network
    147s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    18/08/2024, 18:39

General

  • Target

    0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe

  • Size

    212KB

  • MD5

    fea5fd15a98ac955446d7360df6ae088

  • SHA1

    efb45417fea51f5113246d7860f2f755c3c282ee

  • SHA256

    0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b

  • SHA512

    e229f46dcea674ba25fcd0ccb62e7c22f14dbfd3592a9aad47273703a1a7801a61c12f46a0a8cfa6f2b2bf063b4bcf50ace57f375aaca3e9b317d5bdae05f11c

  • SSDEEP

    3072:XGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:XG/iVkO20SFgBhxtW9mG9+Umt3Ezjb

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe
    "C:\Users\Admin\AppData\Local\Temp\0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1468
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:4148

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\YYI0S376\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Users\Admin\AppData\Local\Temp\21E8.tmp

    Filesize

    41KB

    MD5

    0213896cdc220cf0ed88a3587281a4fa

    SHA1

    84d27ddb2518600cbe103b16f3e04c630df99ff2

    SHA256

    21117c289cdda00fd98d415af824d21ac3cc9b1021773ee28fea2dccce8f0eaf

    SHA512

    f6124d85988bfbf3997ae2b5ba340a0efeb0693c03f85763b62ea724b833ba816317d5f143f085dc30ec3d91b5a8d33a6924b62b14840c982a67d8f72d044bae

  • C:\Users\Admin\AppData\Local\Temp\5F9.tmp

    Filesize

    593B

    MD5

    3b03d93d3487806337b5c6443ce7a62d

    SHA1

    93a7a790bb6348606cbdaf5daeaaf4ea8cf731d0

    SHA256

    7392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30

    SHA512

    770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88

  • C:\Users\Admin\AppData\Local\Temp\5F9.tmp

    Filesize

    593B

    MD5

    926512864979bc27cf187f1de3f57aff

    SHA1

    acdeb9d6187932613c7fa08eaf28f0cd8116f4b5

    SHA256

    b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f

    SHA512

    f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b

  • C:\Users\Admin\AppData\Local\Temp\B102.tmp

    Filesize

    24KB

    MD5

    7d0c47fae44e917bf712e971d0d00f1d

    SHA1

    a34fe5e4ff91d6f8dc14cf37c06249569c8d53b5

    SHA256

    9c90fee503882871d730985289cc44d1d072993171db3389e1e2a4c216f5fc06

    SHA512

    153b0530b679f29cefe46e6db9c1722306e04277aa3329855e7ed781836bc0ac8802ce58ebb41b8a2a9c05a4df5918e14ffe9080b29d645d6a9dd578f4ce3ce0

  • C:\Windows\apppatch\svchost.exe

    Filesize

    212KB

    MD5

    f02464b414792538a48662144b5a0d80

    SHA1

    41a4d9b4f97003cdbca9127fb85569b31eac2790

    SHA256

    4a8d8375ba8fb862cc2de39873bd8fbe97cb84ebdb2878d4084ab9cbf515d728

    SHA512

    90f93c56b172e8614d88acdf9ebafb915c997f485b5aaa67d2787b6611f530b4697d64a218c7d9628b637a10c339e6b43cee93f5ec00e34a4576e20d56f7a232

  • memory/1468-0-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/1468-1-0x0000000002360000-0x00000000023B1000-memory.dmp

    Filesize

    324KB

  • memory/1468-2-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1468-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1468-15-0x0000000002360000-0x00000000023B1000-memory.dmp

    Filesize

    324KB

  • memory/1468-14-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/4148-67-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-60-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-19-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/4148-20-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-24-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-22-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-74-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-59-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-43-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-36-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-29-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-26-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-25-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-79-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-78-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-77-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-76-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-75-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-73-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-72-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-71-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-70-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-69-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-68-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-17-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/4148-66-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-65-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-64-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-63-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-62-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-61-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-18-0x0000000003140000-0x00000000031E8000-memory.dmp

    Filesize

    672KB

  • memory/4148-58-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-57-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-56-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-55-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-54-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-53-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-52-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-51-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-50-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-49-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-48-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-47-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-46-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-45-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-44-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-42-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-41-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-40-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-39-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-38-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-37-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-35-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-34-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-33-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-32-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-31-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-13-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/4148-12-0x0000000000400000-0x00000000005B8000-memory.dmp

    Filesize

    1.7MB

  • memory/4148-30-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-27-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB

  • memory/4148-28-0x00000000032F0000-0x00000000033A6000-memory.dmp

    Filesize

    728KB