Analysis

  • max time kernel
    102s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/31/3189e8f177434ce566e33cc1ffa515f0.rgb

  • Size

    18KB

  • MD5

    7a5388732b4df79f741fa7b98bc6013e

  • SHA1

    0e792aa8dc2e2f55811d0c80d7dc021a3e8db856

  • SHA256

    e4e48d16d6cc23dc3ee4441cf7fad0069f06c8323affbadaee8830895e3b9e57

  • SHA512

    63f1814037abc76609aeb3308ef02092dd485c6c832fbe6d7a4bef857d62d7e96d71875cb32570fbed5a4966dfc589b9c4b29f773c25f5c0a387a3154c98cea5

  • SSDEEP

    48:jqI/Qi4wkxp9/YhvCTNaWUBlb+eNf60MBNISqibKB5m8RCvlNqPNNSVecyaSs2aP:m7xp9gs7yx+K6UxVkJiGryaSs2HYJj9

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\31\3189e8f177434ce566e33cc1ffa515f0.rgb"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2140
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\31\3189e8f177434ce566e33cc1ffa515f0.rgb
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2984
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\31\3189e8f177434ce566e33cc1ffa515f0.rgb"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2920

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    1e2defe0a4ea99b97ea277515d22cda8

    SHA1

    c8d9ab747199f247b68c99d17f1cc1a5fda016cc

    SHA256

    ce7951346f06fcd6f013c8a902d2cdbacdbd3023353f35ea9954db3cdf2a5a39

    SHA512

    b144f28e719d8a8aaa987078aa1788eb117dc3e5cf67fce5997cabb05d9a81da77d7f464846b14c41fa87d892cd905dec02e2477a13f53fd864646cdf4904d11