Analysis

  • max time kernel
    120s
  • max time network
    108s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21-08-2024 15:30

General

  • Target

    dfcb72df9d7365a74214073b7006d9a0N.exe

  • Size

    209KB

  • MD5

    dfcb72df9d7365a74214073b7006d9a0

  • SHA1

    6d1b58acc1fdf1961c6ec807c669e67684d93b4f

  • SHA256

    74550647b3a5e08fb3ffaeb4444beeea3e86312919a7e7350008062aeeac37e3

  • SHA512

    35b143b4bd084634c40f517b92f0843a725553064be5cf167d52f5ad099407d56540885811b163bf861908df587973179f6d05933141efd612b5704ed43607f7

  • SSDEEP

    3072:0Qcjk9tVRNIcjb4Ryfjijjx14hdeCXHKPJFo9zpE7Di0X0JuLL+o7BlpF9e:0Qh9tVRm2kh34hdeCkcG7DEALLlnN

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\dfcb72df9d7365a74214073b7006d9a0N.exe
    "C:\Users\Admin\AppData\Local\Temp\dfcb72df9d7365a74214073b7006d9a0N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1520
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3964

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    209KB

    MD5

    942fc6487cd9461a5023808b6cdabde5

    SHA1

    0ce17e44f5c9bd6dbc69192430e73fd7eb8dc72b

    SHA256

    d2cec81610a727387cb64cbae3f15ebbcad952bbdda8170c1c354bf5a6d33dbe

    SHA512

    e72442f474acb44807cfe0766038887ae0b0f0a0118e9b45b356e211f414e987c11b9315baec46c24ffbc4ddb3f3bdd3c90cbbd306b69aeb6928b56ee2814e98

  • memory/1520-0-0x00000000021D0000-0x0000000002228000-memory.dmp

    Filesize

    352KB

  • memory/1520-1-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/1520-13-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/1520-12-0x00000000021D0000-0x0000000002228000-memory.dmp

    Filesize

    352KB

  • memory/3964-15-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3964-14-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3964-16-0x0000000002770000-0x00000000027FA000-memory.dmp

    Filesize

    552KB

  • memory/3964-17-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/3964-18-0x0000000002B40000-0x0000000002BD9000-memory.dmp

    Filesize

    612KB

  • memory/3964-20-0x0000000002B40000-0x0000000002BD9000-memory.dmp

    Filesize

    612KB

  • memory/3964-22-0x0000000002B40000-0x0000000002BD9000-memory.dmp

    Filesize

    612KB

  • memory/3964-25-0x0000000002B40000-0x0000000002BD9000-memory.dmp

    Filesize

    612KB