Analysis
-
max time kernel
28s -
max time network
34s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20/10/2022, 20:42
Static task
static1
Behavioral task
behavioral1
Sample
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe
Resource
win10v2004-20220812-en
General
-
Target
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe
-
Size
261KB
-
MD5
96e5a9de91aa21b8d59e5680bc8e98a0
-
SHA1
f7ec2873abc2ad78587f2affbdb6e9ae5e876017
-
SHA256
0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21
-
SHA512
5dc639d23bc8a108999ad59b1383f5078bc5caf70c4ef0fea4f6189e9b0ae8454a1a514814bc7be843c79f5685bfae7433af90161f4949662adcb17fbda3da6b
-
SSDEEP
6144:lFcHD8/oPXwlhYtkRnLbstrHxrLWpwcHA6Q8o+mEX8YG:wLXdtkRnM5pLWOF6QkX8Y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "C:\\ProgramData\\lgrgopc\\cwgfhn.exe,explorer.exe" 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce\w5qd03t = "C:\\ProgramData\\gtghma\\uftnos.exe" 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe -
Suspicious behavior: MapViewOfSection 4 IoCs
pid Process 1268 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe 1268 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe 4124 svchost.exe 4124 svchost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 1268 wrote to memory of 4124 1268 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe 81 PID 1268 wrote to memory of 4124 1268 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe 81 PID 1268 wrote to memory of 4124 1268 0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe 81 PID 4124 wrote to memory of 5076 4124 svchost.exe 82 PID 4124 wrote to memory of 5076 4124 svchost.exe 82 PID 4124 wrote to memory of 5076 4124 svchost.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe"C:\Users\Admin\AppData\Local\Temp\0f71f379db3ff37fcca05d0a08542afeffec018ad8f22617f37965aa6a5fde21.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1268 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵PID:5076
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
365B
MD5181917afafec2d80663e3897fa3999cb
SHA186d74b74c00b3e447081e2db0f525fb252d47946
SHA2569f507f95344fe0358446a773eba708b15c42c47449d6316bc47a724a2192d372
SHA5127573ba46bcc97a85048e945ae236409af3e4fef18fcf5d76b4b791851117b75600de15b29ea6ae8948218e94613a7314c512fed9d48e8ecaf694bcc80b3bc4dc