Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
18/10/2022, 06:20
Static task
static1
Behavioral task
behavioral1
Sample
39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe
Resource
win10v2004-20220812-en
General
-
Target
39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe
-
Size
355KB
-
MD5
391ad1263c4d56ca07e108521c964a35
-
SHA1
e8d2e7be0d15bdebce794a8db1192350b31f6549
-
SHA256
39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94
-
SHA512
32efa674cc9a19f65235d209924b56826b40fc9160a4ad25a09f12c51226fd9e1af1e31ad501addad38ac0b8e2eadd2ea6fa886d7d1441b1c1b6ad5e35758bf2
-
SSDEEP
6144:T3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:gmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1120 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4221eaab = "\x17Š\x1b›À\n\u00ad†\"ú™µü“\x15¤WGÃk,‰©\x05œ˜%VŽúYª¿LÑHì¬Ü\n¯òùÐü!‹Ô¼ô\x05?'PÇ7À•×\x1b\\PƒÍa9\x03¬\x14\x1cµ\x13ôà|ä·%Ã2J4H(è\f\\\u008d\rµ€úãsäËÄ„zD?\x10ÚeÅ•+Q,[Ð;„ÂD¿Óã\\K\n÷—" 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4221eaab = "\x17Š\x1b›À\n\u00ad†\"ú™µü“\x15¤WGÃk,‰©\x05œ˜%VŽúYª¿LÑHì¬Ü\n¯òùÐü!‹Ô¼ô\x05?'PÇ7À•×\x1b\\PƒÍa9\x03¬\x14\x1cµ\x13ôà|ä·%Ã2J4H(è\f\\\u008d\rµ€úãsäËÄ„zD?\x10ÚeÅ•+Q,[Ð;„ÂD¿Óã\\K\n÷—" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe File opened for modification C:\Windows\apppatch\svchost.exe 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe 1120 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3528 wrote to memory of 1120 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 81 PID 3528 wrote to memory of 1120 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 81 PID 3528 wrote to memory of 1120 3528 39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe"C:\Users\Admin\AppData\Local\Temp\39b210fec0f5fcd85310aceddb8af919e566f3fb0b249323586c86cdef590d94.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3528 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1120
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
355KB
MD5bdce69fb5b6f14b5b9f6c15f7513b153
SHA134eb0be87d93f9fbde3ece6524a84e345227d759
SHA256b4e86a624ca632d16fdb9b99bb24a1842c35d96dd1890b919ee01e689062a1f2
SHA51250d6736be97cedc21f442a4eec2327db9b0d0631a69547bc0581cb27239ff4ea2eb63fcfdd23e001c7b2ed47deee279392d2df8cd21e838acbfb5b610864abce
-
Filesize
355KB
MD5bdce69fb5b6f14b5b9f6c15f7513b153
SHA134eb0be87d93f9fbde3ece6524a84e345227d759
SHA256b4e86a624ca632d16fdb9b99bb24a1842c35d96dd1890b919ee01e689062a1f2
SHA51250d6736be97cedc21f442a4eec2327db9b0d0631a69547bc0581cb27239ff4ea2eb63fcfdd23e001c7b2ed47deee279392d2df8cd21e838acbfb5b610864abce