Analysis

  • max time kernel
    150s
  • max time network
    148s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20/09/2024, 01:57

General

  • Target

    fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe

  • Size

    156KB

  • MD5

    6f322f479f59054e175da2aa55a8cb4b

  • SHA1

    5f8cbfcf30296a8a37686710ebab2a9cd709846f

  • SHA256

    fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df

  • SHA512

    8542de14a0180f32260d6df7ffbab3ee0b68e78a4664f422e3ae2ff16d4b2aefa0bec7f10e07a10da521ca76e2a774237121404d17cf24b0ba7265d6441495b7

  • SSDEEP

    3072:ikvM+OOUYjo0i2JdvIArAVMBWfvgfJYraeL/qHQl:RM+Fo2JxeMw3g42HQl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe
    "C:\Users\Admin\AppData\Local\Temp\fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4400
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:3480

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    156KB

    MD5

    9263eb7e6896fc32e297c63bf6586936

    SHA1

    4f0c9516859d33eab1ad3c32152c51cb319f4495

    SHA256

    41e752879761cdd14c3822122f132be62b89cb36891a3484941ab5d3ad18f44b

    SHA512

    cec921212db8240c87f3df12700caf1140916a7ec7c416640b27621bb09b14df18023107e32f3141c7b51a07578afdb72f9e22dcff4a80133979379560de3e79

  • memory/3480-10-0x00000000035B0000-0x00000000035F6000-memory.dmp

    Filesize

    280KB

  • memory/3480-13-0x0000000003940000-0x000000000398A000-memory.dmp

    Filesize

    296KB

  • memory/3480-17-0x0000000003940000-0x000000000398A000-memory.dmp

    Filesize

    296KB

  • memory/3480-14-0x0000000003940000-0x000000000398A000-memory.dmp

    Filesize

    296KB

  • memory/3480-19-0x0000000003940000-0x000000000398A000-memory.dmp

    Filesize

    296KB

  • memory/3480-20-0x0000000003940000-0x000000000398A000-memory.dmp

    Filesize

    296KB

  • memory/4400-9-0x0000000000AF0000-0x0000000000B20000-memory.dmp

    Filesize

    192KB