Analysis
-
max time kernel
146s -
max time network
163s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
29/10/2022, 02:06
Static task
static1
Behavioral task
behavioral1
Sample
e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe
Resource
win10v2004-20220812-en
General
-
Target
e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe
-
Size
212KB
-
MD5
41633143cc0c60b0dd63666f3e48cf0e
-
SHA1
31382e5500568f4dc228a12f169065a4cec3a5dc
-
SHA256
e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd
-
SHA512
1e17346ce1861eb66926625ba16f0c06a9b8939d6c66ce9696cdf5bfba5becce1c1d37cc9866ac132ecf202d9dc5dedb80684f6adf4bb2395a864a6d66fecff7
-
SSDEEP
3072:8Cp92OF9j48oGabSYZyG892cfyu1B9MOG7uiVBEjkdYlvgXiTaBHXO/CE0wXg478:8CpB3M8oHK5KuFi7uiVBjdYlYnUf04un
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4608 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d56895f0 = "7\x1eì£ô#ÌÈô¬„\x05\x03\x1ckd)§mwðõˆŸ«Gƒ\rX´Š$ż€\flµ]”\x04Œ\x05" e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d56895f0 = "7\x1eì£ô#ÌÈô¬„\x05\x03\x1ckd)§mwðõˆŸ«Gƒ\rX´Š$ż€\flµ]”\x04Œ\x05" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe File opened for modification C:\Windows\apppatch\svchost.exe e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe 4608 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4220 wrote to memory of 4608 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 81 PID 4220 wrote to memory of 4608 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 81 PID 4220 wrote to memory of 4608 4220 e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe"C:\Users\Admin\AppData\Local\Temp\e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4220 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4608
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
212KB
MD52d69b7738466ce544e2131be1e215020
SHA1882572c9afefeef90f551d18d80ba667c3051eef
SHA256a25e77edd626654f72e903ffd110890e43964bdc6f23824194fcad186b248e08
SHA512a937f96dbfd39e806ef2fdf97bd3c715490ea2caf889691bb1ff60766d457d2082649b3440fcd31321647fdf735bb73df773b1289fc1ca652e674669c1369c68
-
Filesize
212KB
MD52d69b7738466ce544e2131be1e215020
SHA1882572c9afefeef90f551d18d80ba667c3051eef
SHA256a25e77edd626654f72e903ffd110890e43964bdc6f23824194fcad186b248e08
SHA512a937f96dbfd39e806ef2fdf97bd3c715490ea2caf889691bb1ff60766d457d2082649b3440fcd31321647fdf735bb73df773b1289fc1ca652e674669c1369c68