Analysis
-
max time kernel
148s -
max time network
192s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 23:00
Static task
static1
Behavioral task
behavioral1
Sample
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe
Resource
win10v2004-20221111-en
General
-
Target
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe
-
Size
205KB
-
MD5
4412e4403a4d6bad009c048530618305
-
SHA1
18d075d294a02ed77ae16876ceaccfab30f9170b
-
SHA256
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5
-
SHA512
2cc208eaedcdb91b44aaef1f46aa27bb5540768b549128c8cc362c850fe0ed3199fa62f875c2f991b99e9695299f1c3202d29912bf3c9706a51bca38dd609769
-
SSDEEP
3072:NcyjuBAS1S8JMMiKApnj2YiOjxT8Tr+88m+V8tF0IxIT08oM+CZUbbpscQ8hjjk:kGS1LJMPpmOlM8m+VYF0OGF9jUScr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 564 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\software\microsoft\windows\currentversion\run svchost.exe Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\run svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6da9ba0 = "C:\\Windows\\apppatch\\svchost.exe" 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lygynud.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykyc.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyvyz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purypol.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyvep.com svchost.exe File created C:\Program Files (x86)\Windows Defender\ganyrys.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygygin.com svchost.exe File created C:\Program Files (x86)\Windows Defender\ganyzub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vopycom.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe File created C:\Windows\apppatch\svchost.exe 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 564 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe Token: SeSecurityPrivilege 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe Token: SeSecurityPrivilege 564 svchost.exe Token: SeSecurityPrivilege 564 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 564 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 28 PID 1236 wrote to memory of 564 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 28 PID 1236 wrote to memory of 564 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 28 PID 1236 wrote to memory of 564 1236 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe"C:\Users\Admin\AppData\Local\Temp\1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:564
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD59fb3849554a3b2b6caf9d7c9e17fc3fd
SHA10ee0a4eca2145982177b39858ba9086f10f21df7
SHA256e4c261d08930152c4d8bdcca7fff0e93e32d60c1723b1d8fe551b54dcd8067e7
SHA5121c7f07e38308db061202bf09f6ec8eb0a51f7065cc5ed07c8b9032cdfd0c5c5f35e8960dfab39b7d6915e934e2352cfe736c106a01ee775abf8e47adc3f1ede9
-
Filesize
205KB
MD59fb3849554a3b2b6caf9d7c9e17fc3fd
SHA10ee0a4eca2145982177b39858ba9086f10f21df7
SHA256e4c261d08930152c4d8bdcca7fff0e93e32d60c1723b1d8fe551b54dcd8067e7
SHA5121c7f07e38308db061202bf09f6ec8eb0a51f7065cc5ed07c8b9032cdfd0c5c5f35e8960dfab39b7d6915e934e2352cfe736c106a01ee775abf8e47adc3f1ede9
-
Filesize
205KB
MD59fb3849554a3b2b6caf9d7c9e17fc3fd
SHA10ee0a4eca2145982177b39858ba9086f10f21df7
SHA256e4c261d08930152c4d8bdcca7fff0e93e32d60c1723b1d8fe551b54dcd8067e7
SHA5121c7f07e38308db061202bf09f6ec8eb0a51f7065cc5ed07c8b9032cdfd0c5c5f35e8960dfab39b7d6915e934e2352cfe736c106a01ee775abf8e47adc3f1ede9
-
Filesize
205KB
MD59fb3849554a3b2b6caf9d7c9e17fc3fd
SHA10ee0a4eca2145982177b39858ba9086f10f21df7
SHA256e4c261d08930152c4d8bdcca7fff0e93e32d60c1723b1d8fe551b54dcd8067e7
SHA5121c7f07e38308db061202bf09f6ec8eb0a51f7065cc5ed07c8b9032cdfd0c5c5f35e8960dfab39b7d6915e934e2352cfe736c106a01ee775abf8e47adc3f1ede9