Analysis

  • max time kernel
    122s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/22/22131084f3072603c13218a186a9e0ed.rsc.sse

  • Size

    27KB

  • MD5

    46121dcc6a8f600e8553a48bca456405

  • SHA1

    f268671464ae2bbe798a8b17fddf4e67b3db0e4b

  • SHA256

    38f118b6dde39b442292e507d8d8f64158d2ae9b26a42b42d9f506c100464e46

  • SHA512

    d800db8d61a17b88d095ca3372fe4569f59cb2f42fcf0a6db60cd665fd99ad0bf5adefcaabc047eb2cd4230aed880395787e0948d5a34659fcde3edfe7b33350

  • SSDEEP

    384:O+bF7TZ8HWRL+1+7mR30AZlSIZ1LRiRjJgknvX:jbF3Z8Aa+7mRdD5b

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.rsc.sse"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1812
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.rsc.sse
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2768
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.rsc.sse"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2360

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    02d1adfde4839f8e567452d6c85a90f2

    SHA1

    196d60981e3665cf7abcb907d21157c7d861f9e5

    SHA256

    9b2f3887e64b1981920a84b0743ebea1ade64f25a70b9e4d11d9e90ce96d3be6

    SHA512

    a5c8654ff690add82885af18b162cf7fea7b0449b593b3ef4feb4c6cf1bd0cbd00233265168033789ebfaf3bda1187fe5b40371adfa4bef8ffc22e6fb677ee67