Analysis

  • max time kernel
    120s
  • max time network
    97s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240802-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system
  • submitted
    27/09/2024, 17:39

General

  • Target

    3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe

  • Size

    157KB

  • MD5

    a579bbe96e4a3e15653ab02e60927e70

  • SHA1

    4be1539006aca580caa09a546f13eb0e10a8ecc0

  • SHA256

    3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8

  • SHA512

    6336e650cba92b11251a4ee393ba825695cfe7a1009dfaef93eb79046f19a5c5c6c483abb005a2264eb4a627482d3aea1559ebf464a89746b3c602a9f666f257

  • SSDEEP

    3072:teVsjyYsAq/C3RCzgJHvNA1PpYfFL6zU+BEfi:4OjjqahUSPe1SZ+h

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
    "C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1064
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2876

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\apppatch\svchost.exe

          Filesize

          157KB

          MD5

          75edae73df143ef783946bfe85370531

          SHA1

          75db9e661497084d32da0d215a8772e6d2e88ee1

          SHA256

          f349ae1e7d57e159f57bf5fa6d7a10ed99866e1360b734a8289b788453512f18

          SHA512

          0fc44f100cfc3a84e0a9977baec08f0adef725ea64fb22671cf9d4296ec0169d3e4806d1000e19895b7ceb19da4a4f2f1cabbf164df58e7bc70987eb819c0e5b

        • memory/1064-8-0x00000000006A0000-0x00000000006D0000-memory.dmp

          Filesize

          192KB

        • memory/2876-10-0x0000000003260000-0x00000000032A6000-memory.dmp

          Filesize

          280KB

        • memory/2876-13-0x0000000003600000-0x000000000364A000-memory.dmp

          Filesize

          296KB

        • memory/2876-17-0x0000000003600000-0x000000000364A000-memory.dmp

          Filesize

          296KB

        • memory/2876-14-0x0000000003600000-0x000000000364A000-memory.dmp

          Filesize

          296KB

        • memory/2876-19-0x0000000003600000-0x000000000364A000-memory.dmp

          Filesize

          296KB