Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 03:38

General

  • Target

    13c841255f00d2d2468207b65c63a10b09bb9c330636935a96250a4751d38157N.exe

  • Size

    252KB

  • MD5

    caf451422e41311ea597e3b695b1c7b0

  • SHA1

    2de97dc12a78d83ab9489eae6db75cb045b86b2a

  • SHA256

    13c841255f00d2d2468207b65c63a10b09bb9c330636935a96250a4751d38157

  • SHA512

    dac6e207af3c1fb3e1e823124e1211c3116e528e7a29383f2f3752571fd3acce23a65f12c78cfe581c83b5afa2d1eda4fae5c46ab3c887ed4e33b5bc2ae6dd55

  • SSDEEP

    6144:lBPQZN9D1cY72aMAlMwfMufSjrimtbQKBN3a8jS:l+58yMqf2Ztb36

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Modifies WinLogon 2 TTPs 1 IoCs
  • Drops file in System32 directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\13c841255f00d2d2468207b65c63a10b09bb9c330636935a96250a4751d38157N.exe
    "C:\Users\Admin\AppData\Local\Temp\13c841255f00d2d2468207b65c63a10b09bb9c330636935a96250a4751d38157N.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Modifies WinLogon
    • Drops file in System32 directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    PID:1304

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads