Analysis

  • max time kernel
    141s
  • max time network
    19s
  • platform
    windows7_x64
  • resource
    win7-20241010-en
  • resource tags

    arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system
  • submitted
    06-11-2024 23:55

General

  • Target

    73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe

  • Size

    753KB

  • MD5

    c2cdc14235b70d09dbad55af6202d7eb

  • SHA1

    72145ec4baac4c0839c409a028aa473a7403673b

  • SHA256

    73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8

  • SHA512

    b1bd8d30c399ef18b2cc473778ab26b9489dec6cbe1b921b043fdaa3bd99a4e6796be1db5f02490da606cf48096c9b538e47fd6422c93084d1774688095086e7

  • SSDEEP

    12288:w3rHcIck2bHbGVItlponOR0dHc3mlasg1wvIVtfBl858QFGBqM8f:w3BwO1nDH2BXrk58QFmEf

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • UAC bypass 3 TTPs 1 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe
    "C:\Users\Admin\AppData\Local\Temp\73782bd2a7e22ad9b0cf75db952caac03b1db76549dfa8d79d68af50056359e8.exe"
    1⤵
    • Modifies WinLogon for persistence
    • UAC bypass
    • System Location Discovery: System Language Discovery
    • System policy modification
    PID:2172

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2172-0-0x0000000000400000-0x0000000000689000-memory.dmp

    Filesize

    2.5MB

  • memory/2172-3-0x0000000000400000-0x0000000000689000-memory.dmp

    Filesize

    2.5MB