Analysis

  • max time kernel
    102s
  • max time network
    28s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    07/09/2024, 14:55

General

  • Target

    Lillian Night Succubus Exclusive Contract-v1.2.0/LillianNight_Data/GI/level1/9e/9e31902d765c9fcffd650d2fc932d7b8.caw

  • Size

    5KB

  • MD5

    772691f3f0f383c429ef841f6499327e

  • SHA1

    551f3278a469ab813c6160747acaa5d855adfd9f

  • SHA256

    d9f8e8ec8bce2507cae4877f2fecf184b4f73c2012d20ecfd02e47b50193e7e8

  • SHA512

    2908a4ace86bfae3fa9fdca0db9b6dd019a655583de164e6a6662215bb0263254de848c178db73ca1904648af3e10438b97b5f7a16da00c2d828d54a3bbc0c61

  • SSDEEP

    96:GA3cNb1w8089oS4T1zuli9VSbyq88OcLUM3P2pm52oo2V2+Xg:z3cNJw808+z9VWtOcLU8

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\9e\9e31902d765c9fcffd650d2fc932d7b8.caw"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:844
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\9e\9e31902d765c9fcffd650d2fc932d7b8.caw
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2852
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Lillian Night Succubus Exclusive Contract-v1.2.0\LillianNight_Data\GI\level1\9e\9e31902d765c9fcffd650d2fc932d7b8.caw"
        3⤵
        • System Location Discovery: System Language Discovery
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2832

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

          Filesize

          3KB

          MD5

          028f3fcab31a9dbcc503797f7edf93fd

          SHA1

          e1df0a16069a33f6c76bf985c39991639befa62d

          SHA256

          074feaea19c2039e282fa61b5b49085965f31e11924a5a240e9877964b5351cb

          SHA512

          7612090a19addcde05d168e9e1dd5537933dc16cf812d89aa0fe47ddeabf4d553f52f203a089ecace3c548ffc9f8d8f8b4a289fc7481e15b5982c4c7e015785f