Analysis

  • max time kernel
    120s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 13:14

General

  • Target

    e90cec933eac90ffb6764a41ea9f957130de117214f82c5c9dc6442c03b08529N.exe

  • Size

    338KB

  • MD5

    6b774827e14741d6bfdfdc2959473210

  • SHA1

    8c33fc56e3412d31908c09c689deeba489bd80a0

  • SHA256

    e90cec933eac90ffb6764a41ea9f957130de117214f82c5c9dc6442c03b08529

  • SHA512

    09720e99acae8c4c9918df9d7394417f1e43ee076d33e3974b3c0c330fa336341aad710ddc27f89525c2b73fced8ffc91cc5013889c5c4207ddaaf7b99197d33

  • SSDEEP

    6144:uExz45lS77IQi8Dq+9fXphN2LfjEcYzaWqr57Q7Xwxc4SQjWvvf:8lS71Dq+pcYWWqtfxvSQj2f

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e90cec933eac90ffb6764a41ea9f957130de117214f82c5c9dc6442c03b08529N.exe
    "C:\Users\Admin\AppData\Local\Temp\e90cec933eac90ffb6764a41ea9f957130de117214f82c5c9dc6442c03b08529N.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:840
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2560

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    338KB

    MD5

    645424e54862037cd12f9780b09c88ad

    SHA1

    ed5be87aa5b343b02f0bc094e575ad8c359a040a

    SHA256

    1488ea79f1e569385505216df7036b952ba697d3ce7393120d8cc90442580abb

    SHA512

    490918a07ac109501da2a5d5b3a1258e933230b681fcdd13f3f0db8ca7194c017d447593c300c588e5315caadff9c92f73501ac9e65057a2ecde170d09d920cb

  • memory/840-12-0x0000000000F10000-0x0000000000F77000-memory.dmp

    Filesize

    412KB

  • memory/2560-29-0x0000000000600000-0x000000000069B000-memory.dmp

    Filesize

    620KB

  • memory/2560-27-0x0000000000600000-0x000000000069B000-memory.dmp

    Filesize

    620KB

  • memory/2560-25-0x0000000000600000-0x000000000069B000-memory.dmp

    Filesize

    620KB

  • memory/2560-24-0x0000000000420000-0x00000000004AC000-memory.dmp

    Filesize

    560KB

  • memory/2560-22-0x0000000000420000-0x00000000004AC000-memory.dmp

    Filesize

    560KB

  • memory/2560-20-0x0000000000420000-0x00000000004AC000-memory.dmp

    Filesize

    560KB

  • memory/2560-18-0x0000000000420000-0x00000000004AC000-memory.dmp

    Filesize

    560KB

  • memory/2560-16-0x0000000000420000-0x00000000004AC000-memory.dmp

    Filesize

    560KB

  • memory/2560-14-0x0000000000420000-0x00000000004AC000-memory.dmp

    Filesize

    560KB

  • memory/2560-33-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2560-35-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/2560-37-0x0000000000300000-0x0000000000301000-memory.dmp

    Filesize

    4KB

  • memory/2560-36-0x00000000004B0000-0x00000000004B1000-memory.dmp

    Filesize

    4KB

  • memory/2560-39-0x00000000004C0000-0x00000000004C1000-memory.dmp

    Filesize

    4KB

  • memory/2560-40-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/2560-44-0x00000000004D0000-0x00000000004D1000-memory.dmp

    Filesize

    4KB

  • memory/2560-43-0x00000000004E0000-0x00000000004E1000-memory.dmp

    Filesize

    4KB

  • memory/2560-47-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/2560-46-0x00000000004F0000-0x00000000004F1000-memory.dmp

    Filesize

    4KB

  • memory/2560-51-0x00000000006A0000-0x00000000006A1000-memory.dmp

    Filesize

    4KB

  • memory/2560-50-0x00000000006B0000-0x00000000006B1000-memory.dmp

    Filesize

    4KB

  • memory/2560-53-0x0000000000740000-0x0000000000741000-memory.dmp

    Filesize

    4KB

  • memory/2560-58-0x0000000000750000-0x0000000000751000-memory.dmp

    Filesize

    4KB

  • memory/2560-57-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/2560-60-0x0000000000770000-0x0000000000771000-memory.dmp

    Filesize

    4KB

  • memory/2560-61-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB

  • memory/2560-65-0x00000000007C0000-0x00000000007C1000-memory.dmp

    Filesize

    4KB

  • memory/2560-64-0x0000000002350000-0x0000000002351000-memory.dmp

    Filesize

    4KB

  • memory/2560-67-0x00000000023A0000-0x00000000023A1000-memory.dmp

    Filesize

    4KB

  • memory/2560-68-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/2560-72-0x00000000023B0000-0x00000000023B1000-memory.dmp

    Filesize

    4KB

  • memory/2560-71-0x0000000002400000-0x0000000002401000-memory.dmp

    Filesize

    4KB

  • memory/2560-74-0x0000000002550000-0x0000000002551000-memory.dmp

    Filesize

    4KB

  • memory/2560-75-0x0000000002560000-0x0000000002561000-memory.dmp

    Filesize

    4KB

  • memory/2560-96-0x0000000000600000-0x000000000069B000-memory.dmp

    Filesize

    620KB