Analysis
-
max time kernel
153s -
max time network
167s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
03/12/2022, 11:05
Static task
static1
Behavioral task
behavioral1
Sample
f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe
Resource
win10v2004-20221111-en
General
-
Target
f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe
-
Size
274KB
-
MD5
e3bf490f08ba1c4169819a74461fc464
-
SHA1
55d16e7f656251339b570484c8e86c586cd26586
-
SHA256
f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945
-
SHA512
d2ab30ac9a3486cc256a0e9731d346e34a5bee5325e212086a0182e706f592245927c02224fdc9c9651c10eccafdb63f42e7bfb1d8de7900643f8d518fa9bc5c
-
SSDEEP
6144:3HrnR2l+o+APC1BQLHgXvLIw0uiNNfYSyM2FqRHmZQcoqAkR5:3HMl+dAOQEIwSNfYNM2F5ZZoPkR5
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 964 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c18c2cc7 = "C:\\Windows\\apppatch\\svchost.exe" f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c18c2cc7 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe File opened for modification C:\Windows\apppatch\svchost.exe f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe -
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\‰ ˆ‰‰ f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\‰ ˆ‰‰ svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 964 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1816 wrote to memory of 964 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe 28 PID 1816 wrote to memory of 964 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe 28 PID 1816 wrote to memory of 964 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe 28 PID 1816 wrote to memory of 964 1816 f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe"C:\Users\Admin\AppData\Local\Temp\f6daca44daa22744db69585aaaae78f3b6549fcacc0d67125d5092a0f15a1945.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Modifies registry class
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1816 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:964
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
274KB
MD5811185698f0169e8a19f0dc719459eeb
SHA1773eafccaee3818e42005fe68293ed142ed9d41f
SHA256c1929039b23d1763ed83ad003a846a9b01bbf924afec314a78b0f5ba766afc58
SHA512fa6a10f088f44a2747bc031022e130c70804d7761523ce0aae6e61c5d5f7dc8fba690eb834e453cb08183f76242b7605c05262ceb176c8a8200be40415766f8b
-
Filesize
274KB
MD5811185698f0169e8a19f0dc719459eeb
SHA1773eafccaee3818e42005fe68293ed142ed9d41f
SHA256c1929039b23d1763ed83ad003a846a9b01bbf924afec314a78b0f5ba766afc58
SHA512fa6a10f088f44a2747bc031022e130c70804d7761523ce0aae6e61c5d5f7dc8fba690eb834e453cb08183f76242b7605c05262ceb176c8a8200be40415766f8b
-
Filesize
274KB
MD5811185698f0169e8a19f0dc719459eeb
SHA1773eafccaee3818e42005fe68293ed142ed9d41f
SHA256c1929039b23d1763ed83ad003a846a9b01bbf924afec314a78b0f5ba766afc58
SHA512fa6a10f088f44a2747bc031022e130c70804d7761523ce0aae6e61c5d5f7dc8fba690eb834e453cb08183f76242b7605c05262ceb176c8a8200be40415766f8b
-
Filesize
274KB
MD5811185698f0169e8a19f0dc719459eeb
SHA1773eafccaee3818e42005fe68293ed142ed9d41f
SHA256c1929039b23d1763ed83ad003a846a9b01bbf924afec314a78b0f5ba766afc58
SHA512fa6a10f088f44a2747bc031022e130c70804d7761523ce0aae6e61c5d5f7dc8fba690eb834e453cb08183f76242b7605c05262ceb176c8a8200be40415766f8b