Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
20-11-2024 13:30
Static task
static1
2 signatures
Behavioral task
behavioral1
Sample
1/Melonity.exe
Resource
win7-20240708-en
windows7-x64
7 signatures
150 seconds
General
-
Target
1/Melonity.exe
-
Size
5.3MB
-
MD5
2b8ed38b6c08850779d90156b49787d8
-
SHA1
aea6b1e78ba9d53b2c02be0d865d230f00548035
-
SHA256
45bcb27494dee65e5a36650054ff8b3041ebdb99fd78d4f8e3d8a41eb073c148
-
SHA512
1bc2863bd2ba39b123fd458e3bb4151405f98d221361f49503444169096333ab1b6818000cccf282c0f90083d5029225e1b1b53c32f99416d1b2622e2151c917
-
SSDEEP
98304:CSYl+O1E/Uo8EoT9AfvDm+CIUzwNhiDbY1UaV/:CS7Uo/bfyhIUziUbIU+
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
WeMod.exeSirus.exepid Process 1428 WeMod.exe 2756 Sirus.exe -
Loads dropped DLL 4 IoCs
Processes:
Melonity.exepid Process 2692 Melonity.exe 2692 Melonity.exe 2692 Melonity.exe 2692 Melonity.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
WeMod.exepid Process 1428 WeMod.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
Melonity.exedescription ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Melonity.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
WeMod.exepid Process 1428 WeMod.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
Melonity.exedescription pid Process procid_target PID 2692 wrote to memory of 1428 2692 Melonity.exe 31 PID 2692 wrote to memory of 1428 2692 Melonity.exe 31 PID 2692 wrote to memory of 1428 2692 Melonity.exe 31 PID 2692 wrote to memory of 1428 2692 Melonity.exe 31 PID 2692 wrote to memory of 2756 2692 Melonity.exe 32 PID 2692 wrote to memory of 2756 2692 Melonity.exe 32 PID 2692 wrote to memory of 2756 2692 Melonity.exe 32 PID 2692 wrote to memory of 2756 2692 Melonity.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\1\Melonity.exe"C:\Users\Admin\AppData\Local\Temp\1\Melonity.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Users\Admin\AppData\Roaming\WeMod.exeC:\Users\Admin\AppData\Roaming\WeMod.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1428
-
-
C:\Users\Admin\AppData\Roaming\Sirus.exeC:\Users\Admin\AppData\Roaming\Sirus.exe2⤵
- Executes dropped EXE
PID:2756
-