Analysis

  • max time kernel
    103s
  • max time network
    53s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/22/22131084f3072603c13218a186a9e0ed.caw

  • Size

    1KB

  • MD5

    cca07d1f24fcee21db9a7495654b3f0d

  • SHA1

    41f3f1cda396d84fad59fce7976629aacd8f0136

  • SHA256

    c6b7abb9cc1bc9ca6970083a9b051d3b31765f3fc5d16527fce886f08bc6a33e

  • SHA512

    363699f125a537c920a5749795db370692eb4f4ad60d994d91f6a5810719bfbf4bc42c91e991ba395f8200a67087d78ada94399516d080aacd26111deac2c551

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.caw"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2800
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.caw
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2892
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\22\22131084f3072603c13218a186a9e0ed.caw"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:3048

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          0b14b5a20185ddfdd962e46d846db8c1

          SHA1

          be4b5756b0b52a5d8eb507e2ac21ad2943169a71

          SHA256

          fb7791e9c8d650b3747575b5f83f9186586ec041431f4ba03fd33e3628b456bd

          SHA512

          386e17edd336742a5c5172fc5e3ad1aa83e8d73c88312566ba04eb23eeceec3f43d75759a56b440db6c54cf231ebc272f16932b0e874d089438291b65ae57b7d