Analysis

  • max time kernel
    117s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20240704-en
  • resource tags

    arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system
  • submitted
    26-08-2024 03:18

General

  • Target

    5a9718b59b789af03134e62c87514bf0N.exe

  • Size

    217KB

  • MD5

    5a9718b59b789af03134e62c87514bf0

  • SHA1

    8b5a822bfd9d345bac7ee2e1cf02f3231fadaeb1

  • SHA256

    51e5d607d6009973f6bd5445a81b57bb6f485b25eabf70f51d37f4c6da777864

  • SHA512

    71dd8acc8865b3c01dff496a0ec3f5b2b938e6b64bb1a3fde39bbd51ce2aabfaf674c431a4ccfbb12a03b3d4cfcb3f4af31022cd74e4c57a6888fc8050496930

  • SSDEEP

    6144:cnyiqVQBf0EaIp8fkTJJsK1eEzEB1XjrkXb:9Edp8csKpE7XX

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 6 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in Program Files directory 16 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5a9718b59b789af03134e62c87514bf0N.exe
    "C:\Users\Admin\AppData\Local\Temp\5a9718b59b789af03134e62c87514bf0N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1864
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • System Location Discovery: System Language Discovery
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2348
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 2984
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2112

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RV23TEDO\login[1].htm

    Filesize

    168B

    MD5

    d57e3a550060f85d44a175139ea23021

    SHA1

    2c5cb3428a322c9709a34d04dd86fe7628f8f0a6

    SHA256

    43edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c

    SHA512

    0364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063

  • C:\Windows\AppPatch\svchost.exe

    Filesize

    217KB

    MD5

    00419685c6069c80f43de6db38c17958

    SHA1

    325ed9cb6f508b33eb0f7b50590654d984f5acc3

    SHA256

    c09cebc6196d94c73bc31dcd1629e9a937b6065c3c473b3dea42ba01cd3cef8d

    SHA512

    ce0267ac57512c90cf66e26982fc7a6c2094ab2b4bf6de3ccb621d9b7c91b0500dec6c3f0bdc5ef440b03ca33d7cba834b4f5ab9c79ca8a1b6ed105d5ffda08b

  • memory/1864-0-0x0000000000260000-0x0000000000263000-memory.dmp

    Filesize

    12KB

  • memory/1864-1-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1864-16-0x0000000000400000-0x000000000045F000-memory.dmp

    Filesize

    380KB

  • memory/1864-15-0x0000000000260000-0x0000000000263000-memory.dmp

    Filesize

    12KB

  • memory/1864-14-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2348-17-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2348-18-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2348-19-0x0000000002300000-0x00000000023AA000-memory.dmp

    Filesize

    680KB

  • memory/2348-27-0x0000000002300000-0x00000000023AA000-memory.dmp

    Filesize

    680KB

  • memory/2348-30-0x0000000000400000-0x0000000000469000-memory.dmp

    Filesize

    420KB

  • memory/2348-29-0x0000000002300000-0x00000000023AA000-memory.dmp

    Filesize

    680KB

  • memory/2348-23-0x0000000002300000-0x00000000023AA000-memory.dmp

    Filesize

    680KB

  • memory/2348-21-0x0000000002300000-0x00000000023AA000-memory.dmp

    Filesize

    680KB

  • memory/2348-25-0x0000000002300000-0x00000000023AA000-memory.dmp

    Filesize

    680KB

  • memory/2348-31-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-33-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-35-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-40-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-37-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-41-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-39-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-38-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-46-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-42-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-44-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-69-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-43-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-45-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-83-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-82-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-81-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-80-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-79-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-78-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-77-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-76-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-75-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-74-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-73-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-72-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-71-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-70-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-68-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-67-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-66-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-65-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-64-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-63-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-62-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-61-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-60-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-59-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-58-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-57-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-56-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-55-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-54-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-53-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-52-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-51-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-50-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-49-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-48-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB

  • memory/2348-47-0x00000000025C0000-0x0000000002677000-memory.dmp

    Filesize

    732KB