Analysis

  • max time kernel
    146s
  • max time network
    163s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    29/10/2022, 02:06

General

  • Target

    e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe

  • Size

    212KB

  • MD5

    41633143cc0c60b0dd63666f3e48cf0e

  • SHA1

    31382e5500568f4dc228a12f169065a4cec3a5dc

  • SHA256

    e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd

  • SHA512

    1e17346ce1861eb66926625ba16f0c06a9b8939d6c66ce9696cdf5bfba5becce1c1d37cc9866ac132ecf202d9dc5dedb80684f6adf4bb2395a864a6d66fecff7

  • SSDEEP

    3072:8Cp92OF9j48oGabSYZyG892cfyu1B9MOG7uiVBEjkdYlvgXiTaBHXO/CE0wXg478:8CpB3M8oHK5KuFi7uiVBjdYlYnUf04un

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe
    "C:\Users\Admin\AppData\Local\Temp\e8b175e84b68158a4fcd7225cecabc5af61f45baf97e7773fff436b5f63fabbd.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:4220
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:4608

Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\apppatch\svchost.exe

          Filesize

          212KB

          MD5

          2d69b7738466ce544e2131be1e215020

          SHA1

          882572c9afefeef90f551d18d80ba667c3051eef

          SHA256

          a25e77edd626654f72e903ffd110890e43964bdc6f23824194fcad186b248e08

          SHA512

          a937f96dbfd39e806ef2fdf97bd3c715490ea2caf889691bb1ff60766d457d2082649b3440fcd31321647fdf735bb73df773b1289fc1ca652e674669c1369c68

        • C:\Windows\apppatch\svchost.exe

          Filesize

          212KB

          MD5

          2d69b7738466ce544e2131be1e215020

          SHA1

          882572c9afefeef90f551d18d80ba667c3051eef

          SHA256

          a25e77edd626654f72e903ffd110890e43964bdc6f23824194fcad186b248e08

          SHA512

          a937f96dbfd39e806ef2fdf97bd3c715490ea2caf889691bb1ff60766d457d2082649b3440fcd31321647fdf735bb73df773b1289fc1ca652e674669c1369c68

        • memory/4220-139-0x0000000002260000-0x00000000022B1000-memory.dmp

          Filesize

          324KB

        • memory/4220-133-0x0000000002260000-0x00000000022B1000-memory.dmp

          Filesize

          324KB

        • memory/4220-134-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4220-140-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4220-132-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4608-138-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4608-141-0x0000000000400000-0x000000000052F000-memory.dmp

          Filesize

          1.2MB

        • memory/4608-142-0x00000000024E0000-0x0000000002588000-memory.dmp

          Filesize

          672KB

        • memory/4608-143-0x0000000002C40000-0x0000000002CF6000-memory.dmp

          Filesize

          728KB

        • memory/4608-144-0x0000000002C40000-0x0000000002CF6000-memory.dmp

          Filesize

          728KB