Analysis

  • max time kernel
    120s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/31/3189e8f177434ce566e33cc1ffa515f0.iws.sse

  • Size

    109KB

  • MD5

    5d3e8d89b45b3bf5a913fad1fa923397

  • SHA1

    842da143059ceba1923f3c7fd8ca5cd45c2c8f83

  • SHA256

    bc89c8b914fc3c03de7249f683eb4cc246954d150591c9333794e1e42781fcca

  • SHA512

    532c37cd949f63f6328b3734649eb09bf7b6e8a69b9d9a65c468ae08350a60acc6b7a98931d202f760898cfa001ed2731ee2fc34f4b72e1f90e5949a0b49e554

  • SSDEEP

    3072:1UBpDY/iFU/ChSQrFJXrMKWS5xfppSMWkFmN+O:1UBCiicrFHWcxXH9O

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\31\3189e8f177434ce566e33cc1ffa515f0.iws.sse"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2412
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\31\3189e8f177434ce566e33cc1ffa515f0.iws.sse
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2780
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\31\3189e8f177434ce566e33cc1ffa515f0.iws.sse"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2788

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          baa7f760b26434d5e1811d7972522a27

          SHA1

          2529ed986c9ac91d204abc1d4ff73d97134863f5

          SHA256

          bf6e661580eca61b4c1e00cd9c7176a17775f03563c6105392d062b9b490a7af

          SHA512

          9bc21b5eb71ce5c9967b0af024ccaa2a7416e0b36bf2525c0858fa17c996bb6c61ab2b812760503f519a51c49deda29c14e75cbf888bbb7749bc8e0f6672a1a6