Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
05-12-2022 11:34
Static task
static1
Behavioral task
behavioral1
Sample
993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe
Resource
win10v2004-20220901-en
General
-
Target
993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe
-
Size
210KB
-
MD5
291a5411f970d817751a844d47b262d5
-
SHA1
7b11ae1b30785cdbd0912ae1e929d8649faf76d9
-
SHA256
993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9
-
SHA512
e231d1e528617354e7002fde5d1f6901b0b50ed19627c8c2ba5dc957638d04562a295a95a14b849b074a91101da6ada84e74739784d66343f8039d3d96f09458
-
SSDEEP
6144:9NS5VmS/+PRHgzKmHMyTTaPrPXa3rkO2E1eJ+p:9IaxgzKmRUs+Oe0
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 384 svchost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\software\microsoft\windows\currentversion\run svchost.exe Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\run svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b92de9a = "°:)\u0081\x14Z\u009d6í¯\x19¡•5É\u00adý\x19Ì;I\b\x02\x1aÉ\x18Pµ\t\x1fVƒ{\u00ad\u008d1\x1d¦êüÉ\x1eñÄB\x04¾õ\x16Ô¤ª|¨yÄ\x01;óШÏ\x0e6¹a" 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe File opened for modification C:\Windows\apppatch\svchost.exe 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe 384 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1612 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1612 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe Token: SeSecurityPrivilege 1612 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe Token: SeSecurityPrivilege 384 svchost.exe Token: SeSecurityPrivilege 384 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1612 wrote to memory of 384 1612 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe 82 PID 1612 wrote to memory of 384 1612 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe 82 PID 1612 wrote to memory of 384 1612 993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe"C:\Users\Admin\AppData\Local\Temp\993b896cd61b594ad9468ddc53a00b8b8ac855e7a0e49d65d1c100543c9525f9.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1612 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:384
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD5731844d4f2735c0298e86758477526f9
SHA12d93dd4187fbcaf5e6a4fbbd71e973b75816d410
SHA256d22e942333e77d2cfcbdeeb3fc4b7b0d1be2f9a388cdaf2e8edeea044751dd1d
SHA5124cbb1d82fe1d19cb6fb5101a7bb7606a9e24e1623aec0dabde4b3df8e485768aa1df9659b5bac08008e68f18331235e97439a4b00e6403c7d6232cafb5fbb15d
-
Filesize
210KB
MD5731844d4f2735c0298e86758477526f9
SHA12d93dd4187fbcaf5e6a4fbbd71e973b75816d410
SHA256d22e942333e77d2cfcbdeeb3fc4b7b0d1be2f9a388cdaf2e8edeea044751dd1d
SHA5124cbb1d82fe1d19cb6fb5101a7bb7606a9e24e1623aec0dabde4b3df8e485768aa1df9659b5bac08008e68f18331235e97439a4b00e6403c7d6232cafb5fbb15d