Analysis

  • max time kernel
    102s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/22/22131084f3072603c13218a186a9e0ed.vis

  • Size

    2KB

  • MD5

    73e6541897e70ce01360b25223e8ec22

  • SHA1

    9704031de56d096d9418d1206316e7180cc054af

  • SHA256

    855cacc0d6fc45a5f3fe4db458a518b44578845e30b9577847d72143f2859c92

  • SHA512

    01a330178958860a8aaaebaacc48e29e4cebda130235c9f548f7a810b82929b924180442d63119b2668d49d4d9e2056868eff85e09d607fe63ca4921ba4e50f3

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.vis"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.vis
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2960
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.vis"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2760

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1e7678b743ee90ba950722ffe5a641e8

    SHA1

    3386b59bc1023ee1ffab61bd01d10966a7de0122

    SHA256

    b49acb677ab90c8ce655a3c409f2dcd19fa6c1ce63c5a1e092c8906f7fe0ebfa

    SHA512

    96c99286b5dcb2cfa52e07e90bf55ca322705f6d36095a15829d0082456bf47254ef1cb4074f4db0d39c1f30c948c0a3b6e46cfde8247bac8b9811de36593dbc