Analysis

  • max time kernel
    78s
  • max time network
    16s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    10-11-2024 08:19

General

  • Target

    451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe

  • Size

    88KB

  • MD5

    7dbc7d98f3a7392ea418dd7cdee549c0

  • SHA1

    8050656fc3829b1014b53cab07ec5418d316a558

  • SHA256

    451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547

  • SHA512

    5bfeccb890dd4f3a189a0daa223b408362148be87e8703d2f4a559b2ec24e75b55b41b8df155450f27bde83001b5631612269e9901d433b625f8af513ed464ba

  • SSDEEP

    1536:t5piVnDXkTbhCtaB6GVA/bVQPxfgiqfoOonoKg+yOH5y/yEd:6D0ctAVA/bmxIMnoKjyR/Nd

Score
5/10

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • UPX packed file 5 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe
    "C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1732
    • C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe
      "C:\Users\Admin\AppData\Local\Temp\451a3627ab9bf9f88261c29a62ec523f0bacb093e8d6c07c221b14df95ce6547N.exe"
      2⤵
      • System Location Discovery: System Language Discovery
      PID:99868
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\HYUWI.bat" "
        3⤵
          PID:98640
          • C:\Windows\SysWOW64\reg.exe
            REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "winlogon" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe" /f
            4⤵
              PID:98808
          • C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe
            "C:\Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe"
            3⤵
              PID:98888

        Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\HYUWI.bat

          Filesize

          149B

          MD5

          6831b89d0b8dc3e07588d733e75c122b

          SHA1

          8c70088c3224bbaf535ed19ec0f6bd5231c543be

          SHA256

          9fe102f2c6dff35f03787b85f725d12347cf491c897730a7f2e818f65177ffc2

          SHA512

          699fb44a25032ee4ad0ace1f941c826b333baddb65049c22e80b272909e85f4c8a00fef73fe2d97fa8998a0b6969b13461237bfc1e8f9bf711849d17d0cda6da

        • \Users\Admin\AppData\Roaming\winlogonr\winlogonr.exe

          Filesize

          88KB

          MD5

          36701de95c265cdae7b5218ea1963eb0

          SHA1

          0307b59f4ebdb72e7cc86eeaf06c07d08c5c4475

          SHA256

          b4e82de08ec60debc576193354df9af3665f9e81036b5ce5f4e6dee46674309f

          SHA512

          6de8cf4e53d22a4285ae39b65f857b9017bc685300245a2a3a91a23cabc3636b2741def6d526a7404b9333e4b74a72ccb2412438b7d4ec939e39effd63a81d19

        • memory/1732-493890-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/1732-4-0x00000000003B0000-0x00000000003B1000-memory.dmp

          Filesize

          4KB

        • memory/1732-14-0x00000000005C0000-0x00000000005C1000-memory.dmp

          Filesize

          4KB

        • memory/1732-58-0x0000000001BE0000-0x0000000001BE1000-memory.dmp

          Filesize

          4KB

        • memory/1732-38-0x0000000000600000-0x0000000000601000-memory.dmp

          Filesize

          4KB

        • memory/1732-26-0x00000000005E0000-0x00000000005E1000-memory.dmp

          Filesize

          4KB

        • memory/1732-1541-0x0000000001C50000-0x0000000001C52000-memory.dmp

          Filesize

          8KB

        • memory/1732-1533-0x0000000001C20000-0x0000000001C22000-memory.dmp

          Filesize

          8KB

        • memory/1732-493882-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/1732-493884-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/1732-68-0x0000000001C00000-0x0000000001C01000-memory.dmp

          Filesize

          4KB

        • memory/1732-76-0x0000000001C20000-0x0000000001C22000-memory.dmp

          Filesize

          8KB

        • memory/1732-493893-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/1732-493881-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/1732-493886-0x0000000000230000-0x0000000000330000-memory.dmp

          Filesize

          1024KB

        • memory/1732-2-0x00000000003B0000-0x00000000003B1000-memory.dmp

          Filesize

          4KB

        • memory/99868-540763-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/99868-540762-0x000000007EFDE000-0x000000007EFDF000-memory.dmp

          Filesize

          4KB

        • memory/99868-540760-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/99868-540758-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/99868-540756-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/99868-540764-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB

        • memory/99868-540765-0x0000000000400000-0x000000000040B000-memory.dmp

          Filesize

          44KB