Analysis

  • max time kernel
    150s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    13-10-2024 22:37

General

  • Target

    0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe

  • Size

    149KB

  • MD5

    a9e66ada276b6718fbe86f4a6a591240

  • SHA1

    b3ad4ea56e030986e2eae3f203a43630ae135fba

  • SHA256

    0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780

  • SHA512

    6c333e24da51f884bf4cf79f1262c2a51caf5e19ff551ce5754be7664d68939ad6154bd2ac2801a6b7df759cd045089d1e6002028bf8d5c7cea3f3d7701531c9

  • SSDEEP

    3072:okvr5pkOOUYjo0i2JdvIArAVMBWfvgfJYraeL/qHQl:rrHkFo2JxeMw3g42HQl

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe
    "C:\Users\Admin\AppData\Local\Temp\0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2516
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:1776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    149KB

    MD5

    53033215e3ce5356459d690eeb0f2d8e

    SHA1

    e90c7d2dec0c6892ff60660dc7168d90ef391a5f

    SHA256

    f397afa239aed750353b157203be548a5dadebe204025924e023641160f1c586

    SHA512

    88bf2a1e4d8e6a84e80c1ff95f123bfcfd76a4c3f64caeb5bc01317644d9b2e5d9b3b6828d230a94808d993b872fd3e0fc54c4cfa0627f69a708f6865c5b3515

  • memory/1776-22-0x0000000000A70000-0x0000000000AB6000-memory.dmp

    Filesize

    280KB

  • memory/1776-18-0x0000000000A70000-0x0000000000AB6000-memory.dmp

    Filesize

    280KB

  • memory/1776-24-0x0000000000A70000-0x0000000000AB6000-memory.dmp

    Filesize

    280KB

  • memory/1776-20-0x0000000000A70000-0x0000000000AB6000-memory.dmp

    Filesize

    280KB

  • memory/1776-16-0x0000000000A70000-0x0000000000AB6000-memory.dmp

    Filesize

    280KB

  • memory/1776-14-0x0000000000A70000-0x0000000000AB6000-memory.dmp

    Filesize

    280KB

  • memory/1776-25-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

    Filesize

    296KB

  • memory/1776-28-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

    Filesize

    296KB

  • memory/1776-29-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

    Filesize

    296KB

  • memory/1776-33-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

    Filesize

    296KB

  • memory/1776-34-0x0000000000AC0000-0x0000000000B0A000-memory.dmp

    Filesize

    296KB

  • memory/2516-13-0x0000000000F30000-0x0000000000F5F68C-memory.dmp

    Filesize

    189KB