Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
18/09/2022, 23:10
Behavioral task
behavioral1
Sample
d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe
Resource
win10v2004-20220901-en
General
-
Target
d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe
-
Size
62KB
-
MD5
cd86f72b7229362fd13a62f358390cd6
-
SHA1
117c833ab0bfe11c68548ff450aee359af83178d
-
SHA256
d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a
-
SHA512
ce5de4cd8aa9b8ff9439ade82d0b2b44ed7f40e5d9d6bcc7a1c78f92ecbbac2fb5c55d697402021313860da68913d3e05667017b458f90fffbbdcd9647321e96
-
SSDEEP
1536:yeN7zFy3KH9ntwviVWexfGHYaLbvWRfsz0Chz:dhzU+mviVWefG4UDsf6vp
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\svch0st_.exe" d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe -
Executes dropped EXE 1 IoCs
pid Process 744 svch0st_.exe -
resource yara_rule behavioral1/files/0x0007000000005c50-64.dat upx behavioral1/files/0x0007000000005c50-65.dat upx behavioral1/memory/1508-75-0x0000000000400000-0x0000000000412000-memory.dmp upx behavioral1/memory/744-78-0x0000000000400000-0x0000000000412000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1572 cmd.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\Windows\svch0st_.exe d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe File opened for modification C:\Windows\svch0st_.exe d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe File opened for modification C:\Windows\lsas.bmp svch0st_.exe File created C:\Windows\lsas.bmp svch0st_.exe File created C:\Windows\Deleteme.bat d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe 744 svch0st_.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 744 svch0st_.exe 744 svch0st_.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1508 wrote to memory of 744 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 26 PID 1508 wrote to memory of 744 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 26 PID 1508 wrote to memory of 744 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 26 PID 1508 wrote to memory of 744 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 26 PID 1508 wrote to memory of 1572 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 27 PID 1508 wrote to memory of 1572 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 27 PID 1508 wrote to memory of 1572 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 27 PID 1508 wrote to memory of 1572 1508 d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe"C:\Users\Admin\AppData\Local\Temp\d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\svch0st_.exeC:\Windows\svch0st_.exe2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:744
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\Deleteme.bat2⤵
- Deletes itself
PID:1572
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
248B
MD5d7e7a25c2615358748fd496c614ab304
SHA1abbc958e524f37c51dd49e832667ee03fbc0ecad
SHA256a70a74fa58de617870260c5b06f1372d1ef5485240395f03ea66e010691af8fd
SHA512d7773f62db9dc55254dccf18b30a3c93a5de83da44b29ef75358664da69d7aac8964821aba6ddba8447b1bd1e454009ca727f90a7ca273f2de6f42cec668085b
-
Filesize
62KB
MD5cd86f72b7229362fd13a62f358390cd6
SHA1117c833ab0bfe11c68548ff450aee359af83178d
SHA256d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a
SHA512ce5de4cd8aa9b8ff9439ade82d0b2b44ed7f40e5d9d6bcc7a1c78f92ecbbac2fb5c55d697402021313860da68913d3e05667017b458f90fffbbdcd9647321e96
-
Filesize
62KB
MD5cd86f72b7229362fd13a62f358390cd6
SHA1117c833ab0bfe11c68548ff450aee359af83178d
SHA256d458d3046fb7b856e851b3b48d04c586c92ad0c1cd2c8cd7104457cafe68761a
SHA512ce5de4cd8aa9b8ff9439ade82d0b2b44ed7f40e5d9d6bcc7a1c78f92ecbbac2fb5c55d697402021313860da68913d3e05667017b458f90fffbbdcd9647321e96