Analysis
-
max time kernel
151s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
05/12/2022, 05:51
Static task
static1
Behavioral task
behavioral1
Sample
f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe
Resource
win10v2004-20220812-en
General
-
Target
f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe
-
Size
208KB
-
MD5
d8e0bd15e2bbcb5aadb7ae81f682d7df
-
SHA1
098a9b774d90a0572cbf26985ff8a5e5ebd7dd2c
-
SHA256
f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4
-
SHA512
6ce8c8699c1afd4b59cafb11e92ba02971a490859c4308c835f17bc8253d52de2e385357580e4c05958f84628b559277e899dc87e42626bf0a62c157c5ad653d
-
SSDEEP
3072:WDPrP0+IfBxULK6ur4AKKV6AopNgyci0phK0jnboVDcu38Xi+1ffsvaspDZc:gz0+uAKz4AKKSYg0jU9cOI3hA
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1268 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\software\microsoft\windows\currentversion\run svchost.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\run svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8c72dff7 = "É\x1e\x1f\x114^¥,Ó9²€ xP1;2œ`cæpÔ¸LÆeÂw¸“=í*" f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe -
Drops file in Program Files directory 9 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lygygin.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purypol.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyvep.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykyc.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyvyz.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe File opened for modification C:\Windows\apppatch\svchost.exe f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe 1268 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1056 f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1056 f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe Token: SeSecurityPrivilege 1056 f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe Token: SeSecurityPrivilege 1268 svchost.exe Token: SeSecurityPrivilege 1268 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1056 wrote to memory of 1268 1056 f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe 81 PID 1056 wrote to memory of 1268 1056 f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe 81 PID 1056 wrote to memory of 1268 1056 f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe"C:\Users\Admin\AppData\Local\Temp\f28c56dfae77c517dd1bcfab9cfa6489834553d7c3f9f022b29b3f02800862c4.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1056 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1268
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
208KB
MD5df82fda496430fc3f5c7d41a8ec550e8
SHA1e2ad2fedb9ee99045b4ea34f24bf389dae180378
SHA25612953ffce395e3d83f30a76fc18ab8a0582ecb236f9a7a4f788b779882d5a94e
SHA5128bd9de964c3ef52f7e2c712145b5b24e8c1dfeec53e71e41fdb990179ce771a823af559c15b5f64f9737bdade7c033c5d336217072e12237f011291fe1b3df5e
-
Filesize
208KB
MD5df82fda496430fc3f5c7d41a8ec550e8
SHA1e2ad2fedb9ee99045b4ea34f24bf389dae180378
SHA25612953ffce395e3d83f30a76fc18ab8a0582ecb236f9a7a4f788b779882d5a94e
SHA5128bd9de964c3ef52f7e2c712145b5b24e8c1dfeec53e71e41fdb990179ce771a823af559c15b5f64f9737bdade7c033c5d336217072e12237f011291fe1b3df5e