Analysis

  • max time kernel
    121s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-09-2024 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/6b/6b561e693a8216de1af4cd3bd3710084.pos

  • Size

    324B

  • MD5

    fd11a6de8d2b812111b51625da476a18

  • SHA1

    8e6f10bb3f261700227ed65345f811a000a95783

  • SHA256

    6355d21289bd703187aeb2fcbe860b6ba61793e9b49d5d3abb844f7377053cdf

  • SHA512

    cec485a1a616bcf6004897ac3b97b6f2379f1812fbb969df6b29ab5f68a962ca50bdd684a4a33ce23f63809ea4f1bc4686cd9718c8f997a28a18bef6f3097fd1

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\6b\6b561e693a8216de1af4cd3bd3710084.pos"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2564
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\6b\6b561e693a8216de1af4cd3bd3710084.pos
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2748
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\6b\6b561e693a8216de1af4cd3bd3710084.pos"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2604

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    86fb6f633a7b9b60790076ace9ce2c72

    SHA1

    c78e62ce06779ddebb5cacdf6040e282261ab52a

    SHA256

    c53cc5137083205dfd6399b70df2309686214534bcd57e997726f47c794375f9

    SHA512

    56a07475efb8a1944359147c7757686514a5b5651949ef4bb25c1d81088939c369ffd2aa1dc0c607bb8e96a7aa4cceaf166e2c88908acdf57c8b6d7b1aba93a7