Analysis

  • max time kernel
    35s
  • max time network
    36s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    20-09-2024 19:32

General

  • Target

    3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe

  • Size

    350KB

  • MD5

    fb0cc0909058659349180cfd92fe1323

  • SHA1

    d8954e8c280db8466f1ffdf1977c389429258f0d

  • SHA256

    3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16

  • SHA512

    c319b557ee1fefdc9726e920ada272062e761fe885f69386f551155fbe96535f64710dc3fdcaead5cf7edbf0461c3cfa7e4531961aafbf975ab514d8484d9ae3

  • SSDEEP

    6144:gVTQySiuxLxeHs/4UvcZSeNH4ikRo6S5W3v71TLnOxV8SyuiNu:2SiieHs/KeoHkzxOxqSyj

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe
    "C:\Users\Admin\AppData\Local\Temp\3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3440
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2332
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2332 -s 804
        3⤵
        • Program crash
        PID:2060
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2332 -ip 2332
    1⤵
      PID:1068

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Windows\apppatch\svchost.exe

      Filesize

      350KB

      MD5

      ce559c085fee20a8d782d035c97ea0f7

      SHA1

      d7b2423a973b181baf5b4ad758864118c0e600c4

      SHA256

      895cc9fb16e893d2fa257f4d6d7b64a9d747e3618b083feb71d7264fcc55aca0

      SHA512

      da0941c359719f7041db4bf04040acd811c9dcb8c1c26a2f30ea565c9e84cb8415f9c12dc2167ee2b37faa6d4c5b6cdb51a9f7ad4063f051ddb667bf72bdf93e

    • memory/2332-10-0x0000000002FA0000-0x0000000002FEA000-memory.dmp

      Filesize

      296KB

    • memory/2332-13-0x0000000003340000-0x0000000003398000-memory.dmp

      Filesize

      352KB

    • memory/2332-17-0x0000000003340000-0x0000000003398000-memory.dmp

      Filesize

      352KB

    • memory/2332-14-0x0000000003340000-0x0000000003398000-memory.dmp

      Filesize

      352KB

    • memory/2332-24-0x0000000003340000-0x0000000003398000-memory.dmp

      Filesize

      352KB

    • memory/3440-9-0x0000000000E60000-0x0000000000EC9000-memory.dmp

      Filesize

      420KB