Analysis

  • max time kernel
    120s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    27/09/2024, 17:39

General

  • Target

    3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe

  • Size

    157KB

  • MD5

    a579bbe96e4a3e15653ab02e60927e70

  • SHA1

    4be1539006aca580caa09a546f13eb0e10a8ecc0

  • SHA256

    3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8

  • SHA512

    6336e650cba92b11251a4ee393ba825695cfe7a1009dfaef93eb79046f19a5c5c6c483abb005a2264eb4a627482d3aea1559ebf464a89746b3c602a9f666f257

  • SSDEEP

    3072:teVsjyYsAq/C3RCzgJHvNA1PpYfFL6zU+BEfi:4OjjqahUSPe1SZ+h

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
    "C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:3020
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2116

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Windows\AppPatch\svchost.exe

          Filesize

          157KB

          MD5

          a9e031e490a7a42a0e9c037eabda380e

          SHA1

          b3fed14cf5482fc149b95a5fe1b2d827e3e88462

          SHA256

          8dbe6f146162efcf7ca31bdc52e01d567156155f14d3096d23da97947791b44c

          SHA512

          1064c6d5f823c75c3eb26a9b060023e3b2c7482381ae0743ce3d58b86674a10ae99bb8350caa6e1a7b43ace8c1f3174f06539b9637e6dd48e795b0312d374cb2

        • memory/2116-14-0x0000000001E60000-0x0000000001EA6000-memory.dmp

          Filesize

          280KB

        • memory/2116-24-0x0000000001E60000-0x0000000001EA6000-memory.dmp

          Filesize

          280KB

        • memory/2116-22-0x0000000001E60000-0x0000000001EA6000-memory.dmp

          Filesize

          280KB

        • memory/2116-20-0x0000000001E60000-0x0000000001EA6000-memory.dmp

          Filesize

          280KB

        • memory/2116-18-0x0000000001E60000-0x0000000001EA6000-memory.dmp

          Filesize

          280KB

        • memory/2116-16-0x0000000001E60000-0x0000000001EA6000-memory.dmp

          Filesize

          280KB

        • memory/2116-27-0x0000000001EB0000-0x0000000001EFA000-memory.dmp

          Filesize

          296KB

        • memory/2116-28-0x0000000001EB0000-0x0000000001EFA000-memory.dmp

          Filesize

          296KB

        • memory/2116-30-0x0000000001EB0000-0x0000000001EFA000-memory.dmp

          Filesize

          296KB

        • memory/2116-34-0x0000000001EB0000-0x0000000001EFA000-memory.dmp

          Filesize

          296KB

        • memory/3020-13-0x00000000012C0000-0x00000000012F0000-memory.dmp

          Filesize

          192KB