Analysis

  • max time kernel
    120s
  • max time network
    96s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    22/11/2024, 18:52

General

  • Target

    cafa3a9f6e1d227791542ae76b2a47242d5b0b62e9d26965a8a46cc9e60c055e.exe

  • Size

    240KB

  • MD5

    5a547ec7ca82bdacf788e603f99af09b

  • SHA1

    615dc3fdcd52a3c60d8e59fb4e0fc81f5cb2436f

  • SHA256

    cafa3a9f6e1d227791542ae76b2a47242d5b0b62e9d26965a8a46cc9e60c055e

  • SHA512

    b51234b2d47181debff9c569fc24e88661c2b15bf1359be5b135b75e3b99ee2c55d2b64639ddb4f01faa880caee3b867e599a255b9294866ad59e6647f23c084

  • SSDEEP

    6144:5uOYYecObhLvkiL2XOdldJNifl4wwXCAjVrUEzvbeTIu//Y:cK1y9hrTiN4nBRrUS6Tf/w

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 2 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious behavior: EnumeratesProcesses 1 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\cafa3a9f6e1d227791542ae76b2a47242d5b0b62e9d26965a8a46cc9e60c055e.exe
    "C:\Users\Admin\AppData\Local\Temp\cafa3a9f6e1d227791542ae76b2a47242d5b0b62e9d26965a8a46cc9e60c055e.exe"
    1⤵
    • Loads dropped DLL
    • Modifies WinLogon
    • Drops file in Windows directory
    • System Location Discovery: System Language Discovery
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:2732
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • System Location Discovery: System Language Discovery
      • Suspicious behavior: EnumeratesProcesses
      PID:2680

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Windows\AppPatch\svchost.exe

    Filesize

    240KB

    MD5

    cc03e610f330611f9b08655a4a3bc94c

    SHA1

    53e5cd4eae877051bf37f74e78575ec57aa3718f

    SHA256

    2af27be4d995a90ae59d7f3e49367d42f6df1734ae6ced17da9e88683e83121b

    SHA512

    4acec925067552509b3c0edfe9d76d086117f86401d1f63d1b7bc7fe8fbfd6bd22f09592735cabe0ce2fc0b02ebf85aa9c1ecaf29aeebcb6a25bb8ee82a78857

  • memory/2680-45-0x00000000007F0000-0x00000000007F1000-memory.dmp

    Filesize

    4KB

  • memory/2680-62-0x00000000030D0000-0x00000000030D1000-memory.dmp

    Filesize

    4KB

  • memory/2680-84-0x0000000003CC0000-0x0000000003CC1000-memory.dmp

    Filesize

    4KB

  • memory/2680-83-0x0000000003CB0000-0x0000000003CB1000-memory.dmp

    Filesize

    4KB

  • memory/2680-18-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2680-81-0x0000000003C90000-0x0000000003C91000-memory.dmp

    Filesize

    4KB

  • memory/2680-80-0x0000000003CA0000-0x0000000003CA1000-memory.dmp

    Filesize

    4KB

  • memory/2680-20-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2680-21-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2680-26-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/2680-32-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/2680-30-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/2680-33-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2680-24-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/2680-22-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/2680-28-0x0000000000480000-0x000000000050C000-memory.dmp

    Filesize

    560KB

  • memory/2680-38-0x0000000002280000-0x000000000231B000-memory.dmp

    Filesize

    620KB

  • memory/2680-36-0x0000000002280000-0x000000000231B000-memory.dmp

    Filesize

    620KB

  • memory/2680-34-0x0000000002280000-0x000000000231B000-memory.dmp

    Filesize

    620KB

  • memory/2680-42-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/2680-44-0x00000000007F0000-0x00000000007F1000-memory.dmp

    Filesize

    4KB

  • memory/2680-77-0x0000000003C90000-0x0000000003C91000-memory.dmp

    Filesize

    4KB

  • memory/2680-76-0x0000000003C80000-0x0000000003C81000-memory.dmp

    Filesize

    4KB

  • memory/2680-48-0x0000000000800000-0x0000000000801000-memory.dmp

    Filesize

    4KB

  • memory/2680-49-0x00000000028F0000-0x00000000028F1000-memory.dmp

    Filesize

    4KB

  • memory/2680-52-0x0000000002BC0000-0x0000000002BC1000-memory.dmp

    Filesize

    4KB

  • memory/2680-53-0x00000000028F0000-0x00000000028F1000-memory.dmp

    Filesize

    4KB

  • memory/2680-55-0x0000000002BD0000-0x0000000002BD1000-memory.dmp

    Filesize

    4KB

  • memory/2680-56-0x0000000003060000-0x0000000003061000-memory.dmp

    Filesize

    4KB

  • memory/2680-59-0x00000000030C0000-0x00000000030C1000-memory.dmp

    Filesize

    4KB

  • memory/2680-60-0x0000000003060000-0x0000000003061000-memory.dmp

    Filesize

    4KB

  • memory/2680-46-0x0000000000550000-0x0000000000551000-memory.dmp

    Filesize

    4KB

  • memory/2680-66-0x0000000003130000-0x0000000003131000-memory.dmp

    Filesize

    4KB

  • memory/2680-67-0x00000000030E0000-0x00000000030E1000-memory.dmp

    Filesize

    4KB

  • memory/2680-69-0x0000000003140000-0x0000000003141000-memory.dmp

    Filesize

    4KB

  • memory/2680-70-0x0000000003350000-0x0000000003351000-memory.dmp

    Filesize

    4KB

  • memory/2680-73-0x0000000003360000-0x0000000003361000-memory.dmp

    Filesize

    4KB

  • memory/2680-74-0x0000000003350000-0x0000000003351000-memory.dmp

    Filesize

    4KB

  • memory/2732-0-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2732-2-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2732-16-0x0000000000400000-0x0000000000477000-memory.dmp

    Filesize

    476KB

  • memory/2732-17-0x0000000000240000-0x00000000002A5000-memory.dmp

    Filesize

    404KB

  • memory/2732-19-0x0000000000400000-0x0000000000467000-memory.dmp

    Filesize

    412KB

  • memory/2732-1-0x0000000000240000-0x00000000002A5000-memory.dmp

    Filesize

    404KB