Analysis

  • max time kernel
    300s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2024 19:18

General

  • Target

    751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.exe

  • Size

    256KB

  • MD5

    1ef9ec76a43b0a208704cdca562e84cd

  • SHA1

    d31082243a555a690d5576c9666648f89e673f63

  • SHA256

    751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe

  • SHA512

    18d9cc4109d526f1588129e9fb6f8b8db4601d5e4c1231d9b58440d27f041044551d5da5afb2fefc9bd62be6a90506aa5b4bd29d788e448c7c0c9b3f7ed4b772

  • SSDEEP

    3072:hJNgCPq8kZpStF3BifIYaX2blO3SbPoTBfnl7hAg0FuW92tpItc6mSbMPzKq:RtP7DR4dB1bPoTBPl7hAOwU16mn7

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.exe
    "C:\Users\Admin\AppData\Local\Temp\751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.exe"
    1⤵
    • Modifies WinLogon for persistence
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\cmd.exe
      cmd /C "route.exe print > "C:\Users\Admin\AppData\Local\Temp\751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.tda""
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2656
      • C:\Windows\SysWOW64\ROUTE.EXE
        route.exe print
        3⤵
        • System Location Discovery: System Language Discovery
        PID:2776

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\751fb51baa5a4ed44c9c2bb45b824831914025e87d4d866e5861a38f734d8bfe.tda

    Filesize

    2KB

    MD5

    7a454068fc5f7f53f01ca9455c0128c2

    SHA1

    96efabdcf784e7180ce6b653fde5bca00d0836e4

    SHA256

    096ad1de6110625e418a56eeae00fe336a36565973346192cce3e241d79a4c36

    SHA512

    b87f2e6345d3b53fb1cd313da549f4ba342f7fc88e151fc5087cb6f51d2757ad3a7e6c16217ee19ba6114738bf3aa8716f3257afc44370c2ebe700fef3d82d28