Analysis
-
max time kernel
190s -
max time network
191s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 23:00
Static task
static1
Behavioral task
behavioral1
Sample
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe
Resource
win10v2004-20221111-en
General
-
Target
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe
-
Size
205KB
-
MD5
4412e4403a4d6bad009c048530618305
-
SHA1
18d075d294a02ed77ae16876ceaccfab30f9170b
-
SHA256
1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5
-
SHA512
2cc208eaedcdb91b44aaef1f46aa27bb5540768b549128c8cc362c850fe0ed3199fa62f875c2f991b99e9695299f1c3202d29912bf3c9706a51bca38dd609769
-
SSDEEP
3072:NcyjuBAS1S8JMMiKApnj2YiOjxT8Tr+88m+V8tF0IxIT08oM+CZUbbpscQ8hjjk:kGS1LJMPpmOlM8m+VYF0OGF9jUScr
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 204 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\software\microsoft\windows\currentversion\run svchost.exe Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\run svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d4b7df20 = "C:\\Windows\\apppatch\\svchost.exe" 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lygygin.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyvyz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykyc.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyvep.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe File opened for modification C:\Windows\apppatch\svchost.exe 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe 204 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4328 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4328 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe Token: SeSecurityPrivilege 4328 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe Token: SeSecurityPrivilege 204 svchost.exe Token: SeSecurityPrivilege 204 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4328 wrote to memory of 204 4328 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 83 PID 4328 wrote to memory of 204 4328 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 83 PID 4328 wrote to memory of 204 4328 1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe"C:\Users\Admin\AppData\Local\Temp\1da884d72c7fcac4d941a59a23108b5aa8868d51a0b137659aff4e4d89550fc5.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4328 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:204
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
205KB
MD56a7610ff945b9df38073944a84445dde
SHA11fd033b004a823a95022a42f495523f3a247326d
SHA25616bc50534a4a9b3b885b7cbf6b2c61f3526d45a016e0b8cb005370335e19a9b2
SHA512b7a9ef0ba75b3d176a756ce709a44cbe6db541393e805110593b80c33b0464b22ee3d119e7002a3aff8e9ff2f9fe604a3b8415d747d47ecb22a8f60ee3432453
-
Filesize
205KB
MD56a7610ff945b9df38073944a84445dde
SHA11fd033b004a823a95022a42f495523f3a247326d
SHA25616bc50534a4a9b3b885b7cbf6b2c61f3526d45a016e0b8cb005370335e19a9b2
SHA512b7a9ef0ba75b3d176a756ce709a44cbe6db541393e805110593b80c33b0464b22ee3d119e7002a3aff8e9ff2f9fe604a3b8415d747d47ecb22a8f60ee3432453