Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
28/10/2022, 18:09
Static task
static1
Behavioral task
behavioral1
Sample
f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe
Resource
win10v2004-20220812-en
General
-
Target
f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe
-
Size
1.0MB
-
MD5
05a798c3c5016cf081553ac0e320538b
-
SHA1
da55d2ed0410ffb2ad04c7ac90dbde9ad0e17fa0
-
SHA256
f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e
-
SHA512
29b2681b04063e1f62e79c64b93c840a259c3d64b2a6fb3d133fa821c9b32afb92cdd463951ff329c01d7daa5222afe245d5fba5cb7a50a110542175f9577ffd
-
SSDEEP
24576:TmUNJyJqb1FcMap2ATT5XmUNJyJqb1FcMap2ATT5XmUNJyJqb1FcMap2ATT5:TmV2ApXmV2ApXmV2Ap
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4832 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\2eb363f0 = "“\nÌGûæ£\x05-«þy" f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\2eb363f0 = "“\nÌGûæ£\x05-«þy" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe File opened for modification C:\Windows\apppatch\svchost.exe f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe 4832 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 668 wrote to memory of 4832 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 83 PID 668 wrote to memory of 4832 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 83 PID 668 wrote to memory of 4832 668 f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe"C:\Users\Admin\AppData\Local\Temp\f2954fdf4c0828596c42034ea0d22762581b09bdc68874589f2dff85873bdc7e.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4832
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.0MB
MD5fb65b10d4d753aa30a6a58ba100525b4
SHA15e6600ffc6d1581082e1a9efe62b90b7f13a1b83
SHA25627748b74bd2ed8985d6bb1444d35eeb4537cdadb3b247effd4d8e281df0b3d83
SHA5124c4776293c9c8559efe6d7958a09d3071839aac1cc1383440a220661014df49cbaaae10d90440faf02b6440524f48d81e485b59ecbc8cf4f5817ea0562e9baac
-
Filesize
1.0MB
MD5fb65b10d4d753aa30a6a58ba100525b4
SHA15e6600ffc6d1581082e1a9efe62b90b7f13a1b83
SHA25627748b74bd2ed8985d6bb1444d35eeb4537cdadb3b247effd4d8e281df0b3d83
SHA5124c4776293c9c8559efe6d7958a09d3071839aac1cc1383440a220661014df49cbaaae10d90440faf02b6440524f48d81e485b59ecbc8cf4f5817ea0562e9baac