Analysis
-
max time kernel
153s -
max time network
47s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
28/11/2022, 04:37
Static task
static1
Behavioral task
behavioral1
Sample
75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe
Resource
win10v2004-20220901-en
General
-
Target
75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe
-
Size
57KB
-
MD5
65dbfe4dd8eb7c9b94bdae5b6d46bb67
-
SHA1
86456512514d4f43ed930b6a8decad89b6639b3f
-
SHA256
75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296
-
SHA512
a14dfcc62c470a1a269b855f262f6c6c377a994f8bcb1f4b597f158600ba3193653fe0bd4e70906d223097fa783bb73709b99346a1402567b6bbc0fce43624b9
-
SSDEEP
768:meNmfdOtRDlXaswgwIQnHwgsz87gmBwd29yAllpUa/HZpuLtd4ikI+byQeqd5x7L:meCd6RhXangwbImmd8yO3ZVvyQNGrvc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "userinit.exeC:\\Windows\\svchost.exe," 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe -
Executes dropped EXE 1 IoCs
pid Process 1260 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 1260 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\PDLL.dll svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svchost.exe 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe File opened for modification C:\Windows\svchost.exe 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 1260 svchost.exe 1260 svchost.exe 1260 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1632 wrote to memory of 1260 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 28 PID 1632 wrote to memory of 1260 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 28 PID 1632 wrote to memory of 1260 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 28 PID 1632 wrote to memory of 1260 1632 75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe"C:\Users\Admin\AppData\Local\Temp\75fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Windows\svchost.exeC:\Windows\svchost.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1260
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
57KB
MD565dbfe4dd8eb7c9b94bdae5b6d46bb67
SHA186456512514d4f43ed930b6a8decad89b6639b3f
SHA25675fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296
SHA512a14dfcc62c470a1a269b855f262f6c6c377a994f8bcb1f4b597f158600ba3193653fe0bd4e70906d223097fa783bb73709b99346a1402567b6bbc0fce43624b9
-
Filesize
57KB
MD565dbfe4dd8eb7c9b94bdae5b6d46bb67
SHA186456512514d4f43ed930b6a8decad89b6639b3f
SHA25675fcc9a9f6d5d8cdffa34f17894ae22f7c035679098b5cb0a8dbbf00fda20296
SHA512a14dfcc62c470a1a269b855f262f6c6c377a994f8bcb1f4b597f158600ba3193653fe0bd4e70906d223097fa783bb73709b99346a1402567b6bbc0fce43624b9
-
Filesize
106KB
MD56d8639481e7da863b32e5c0d06adeab0
SHA10213d960897560948d7e34ecab137ad170ed5329
SHA25646edfedea9cdc3e35b138ca8b6fdd05e2a05413206ff4e89d405a9eb8dee18f3
SHA5121df8d93c6c2c2a006bf7b740b193e1f6d57ed921663d59a20ffe98d5cea948f8f23856cce2d33ca72b5a9f7c7b3ca56c345922212fc1bd719bf3947ea86960a9