Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26/10/2022, 01:22
Static task
static1
Behavioral task
behavioral1
Sample
8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe
Resource
win10v2004-20220901-en
General
-
Target
8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe
-
Size
368KB
-
MD5
22a16aac778046db0211063baf087f01
-
SHA1
b4b956ed95e827e0f3fa6fb41e339119660121d1
-
SHA256
8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2
-
SHA512
8b45b35b593fffda272d361e5f5e1a2c413157e47055de18d3a5a4fc12952e6ffee5419159efb7653373aa7360277034f951ab39a8725c16815ea0ca8e6b281c
-
SSDEEP
6144:T3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei/:gmWhND9yJz+b1FcMLmp2ATTSsd/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 976 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\add86d4a = "\x11\aUä\x03\x17–6\u009dªÇ\b\x16²B\x7fJÝEÚÍd\x11Êeº]7\x16Êû²ÞÊ–Ò»ò!Ö:\u0081ºëÃ\x03éÊ\x16rŠŽ\x16Av\x19ªv\u009dSŽFö¾\x1d³©Õº&þ6y’õ[“Fùöú;±=YŠ©e\x06>ÒšÁ\x052\x033æãñá¹JöŽé\r\tV\x06…¦\x0eÕÁsîËéM›Z–N¢\v\x06ŠN¡F\x02¦ÎÚ\x06ÑézaRñe±ž‚ÒŽÉ\u00adî%\t\vv\x06Õå~92öÊ[Ê\x16\x01vNAKª)Ó•Ê)\u00ad9^Ö\x1bÞæ1êf+>ÕÖ\x19yêö\x19b“†\x139\tUBâýéÁ6¡Ñ1Õžûaö³I‚òNvsâb\u00ad\t\x1bb‹aénæ‘¡EÉ‘S¦û;EJú^K¢f.Þ«~J›¦" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\add86d4a = "\x11\aUä\x03\x17–6\u009dªÇ\b\x16²B\x7fJÝEÚÍd\x11Êeº]7\x16Êû²ÞÊ–Ò»ò!Ö:\u0081ºëÃ\x03éÊ\x16rŠŽ\x16Av\x19ªv\u009dSŽFö¾\x1d³©Õº&þ6y’õ[“Fùöú;±=YŠ©e\x06>ÒšÁ\x052\x033æãñá¹JöŽé\r\tV\x06…¦\x0eÕÁsîËéM›Z–N¢\v\x06ŠN¡F\x02¦ÎÚ\x06ÑézaRñe±ž‚ÒŽÉ\u00adî%\t\vv\x06Õå~92öÊ[Ê\x16\x01vNAKª)Ó•Ê)\u00ad9^Ö\x1bÞæ1êf+>ÕÖ\x19yêö\x19b“†\x139\tUBâýéÁ6¡Ñ1Õžûaö³I‚òNvsâb\u00ad\t\x1bb‹aénæ‘¡EÉ‘S¦û;EJú^K¢f.Þ«~J›¦" 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe File created C:\Windows\apppatch\svchost.exe 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe 976 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1088 wrote to memory of 976 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 27 PID 1088 wrote to memory of 976 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 27 PID 1088 wrote to memory of 976 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 27 PID 1088 wrote to memory of 976 1088 8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe"C:\Users\Admin\AppData\Local\Temp\8e9b0007d2d7be49ea53bee869c3ef8b120b25fa92fef4d4b85cb9ed002a4fc2.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:976
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
368KB
MD52d82bab1c0c2876be58a5e1c7fdffb7f
SHA15576852d03cfa62d2127ca36d922a179cd54f2dc
SHA2565f5f1e5c6ec55fa0fcad9e4772772f675af6c478636ce794a55759f659fe9b49
SHA512778b4c93f33e277872182067ffa2cd426b46173b37bf8643472184fcd66f8966223689ed33da7253f42688d3cdcf6d77c1c8ac1e5d13fb85dc1313dcc0ca69c6
-
Filesize
368KB
MD52d82bab1c0c2876be58a5e1c7fdffb7f
SHA15576852d03cfa62d2127ca36d922a179cd54f2dc
SHA2565f5f1e5c6ec55fa0fcad9e4772772f675af6c478636ce794a55759f659fe9b49
SHA512778b4c93f33e277872182067ffa2cd426b46173b37bf8643472184fcd66f8966223689ed33da7253f42688d3cdcf6d77c1c8ac1e5d13fb85dc1313dcc0ca69c6
-
Filesize
368KB
MD52d82bab1c0c2876be58a5e1c7fdffb7f
SHA15576852d03cfa62d2127ca36d922a179cd54f2dc
SHA2565f5f1e5c6ec55fa0fcad9e4772772f675af6c478636ce794a55759f659fe9b49
SHA512778b4c93f33e277872182067ffa2cd426b46173b37bf8643472184fcd66f8966223689ed33da7253f42688d3cdcf6d77c1c8ac1e5d13fb85dc1313dcc0ca69c6
-
Filesize
368KB
MD52d82bab1c0c2876be58a5e1c7fdffb7f
SHA15576852d03cfa62d2127ca36d922a179cd54f2dc
SHA2565f5f1e5c6ec55fa0fcad9e4772772f675af6c478636ce794a55759f659fe9b49
SHA512778b4c93f33e277872182067ffa2cd426b46173b37bf8643472184fcd66f8966223689ed33da7253f42688d3cdcf6d77c1c8ac1e5d13fb85dc1313dcc0ca69c6