Analysis
-
max time kernel
142s -
max time network
156s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
05-12-2022 18:16
Static task
static1
Behavioral task
behavioral1
Sample
c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe
Resource
win10v2004-20221111-en
General
-
Target
c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe
-
Size
206KB
-
MD5
dda079c146c58757353b766e1ce856d3
-
SHA1
b745ce8df70353383019f759fe18a892bf0d92c0
-
SHA256
c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1
-
SHA512
c98d74bf7d2da4803e37fcf059df0ec465fe473c4a7ffd190c3214ba577eec5544ac95195600345eb4c1ed65761d7343e0e9d55ecf63e19ddb8f82101b4a3a5d
-
SSDEEP
3072:4ZKoxQb+k9QvlM2UomDQEGPjRHfNtPYuD/V9P8rMz8csf2jacKUSI7Lj/PKbcVGX:Grox9QUkEq9/nP3D/jP8Pcu65GbNwy
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1492 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\software\microsoft\windows\currentversion\run svchost.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\run svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b961a108 = "çBÞu\x1bÊ\t\u009dáás-‚ÂbÆxMö±Å°YÚ‰¡«Âçª\v”6\x0eN/t\\\u0090~,–ÎOŠjlŽ/¾h÷––l\x7f\x0fUÿ\x02Èî–\x0f’š\u009d¯ŒôæöDÊ\x7f\u008f\x0fÅŽ\"‚Ò:\n@<j\u009dB\u00adÞ`h五Ԟ:À´ï&Ô·Vd¦\\Þœ%\x1e\u00a0j\u00a0’$XD\x0ff\u00a0\bRÂd¼R$$º¸úo•œâ\x17°ê\x1a¸/z¾¤ŸHL\"xºÚ\x02¿ÅlD\x1c¼H®Tê¼\u00a0¯\x02H<J2Mž\x14ÔORׄ\x1cä·\x10’Xß\x02îÎ\"\x1d|°ßú÷ºT\fl¤š\a2.ÒJýhTTFE¤ü¤…äÊ\x0f7&´€ßöd’²Úîtw„†\x17r‚²BN$*\x18*´×¤â\x17¤w=<r¼ï\x04" c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe -
Drops file in Program Files directory 15 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\gatyvyz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\volykyc.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyvep.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vopycom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygygin.com svchost.exe File created C:\Program Files (x86)\Windows Defender\purypol.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymysan.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\ganyzub.com svchost.exe File created C:\Program Files (x86)\Windows Defender\ganyrys.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe File opened for modification C:\Windows\apppatch\svchost.exe c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe 1492 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe Token: SeSecurityPrivilege 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe Token: SeSecurityPrivilege 1492 svchost.exe Token: SeSecurityPrivilege 1492 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 108 wrote to memory of 1492 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe 27 PID 108 wrote to memory of 1492 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe 27 PID 108 wrote to memory of 1492 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe 27 PID 108 wrote to memory of 1492 108 c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe"C:\Users\Admin\AppData\Local\Temp\c806cde08779946a07cbcb6310d25d4efe584b0fff1a55a49efee778ecd5c6c1.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:108 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1492
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
206KB
MD5cd46cc5733d67b09fd021f021a46ce1a
SHA17de9ba73d866d94fd04d025f53689bbca78eaa34
SHA2562c07217f256cb8b560c7351ee418aea46f8b8ad14e416a2f3f73c38116bc8415
SHA5120ee13e2aacc51033e9c04d682a138a832bb1a9d80f7f262ccf564a4c37ca7ddeda0f24205d4483943ecd673201f101e9a4b5344becfb38126803422eec33665b
-
Filesize
206KB
MD5cd46cc5733d67b09fd021f021a46ce1a
SHA17de9ba73d866d94fd04d025f53689bbca78eaa34
SHA2562c07217f256cb8b560c7351ee418aea46f8b8ad14e416a2f3f73c38116bc8415
SHA5120ee13e2aacc51033e9c04d682a138a832bb1a9d80f7f262ccf564a4c37ca7ddeda0f24205d4483943ecd673201f101e9a4b5344becfb38126803422eec33665b
-
Filesize
206KB
MD5cd46cc5733d67b09fd021f021a46ce1a
SHA17de9ba73d866d94fd04d025f53689bbca78eaa34
SHA2562c07217f256cb8b560c7351ee418aea46f8b8ad14e416a2f3f73c38116bc8415
SHA5120ee13e2aacc51033e9c04d682a138a832bb1a9d80f7f262ccf564a4c37ca7ddeda0f24205d4483943ecd673201f101e9a4b5344becfb38126803422eec33665b
-
Filesize
206KB
MD5cd46cc5733d67b09fd021f021a46ce1a
SHA17de9ba73d866d94fd04d025f53689bbca78eaa34
SHA2562c07217f256cb8b560c7351ee418aea46f8b8ad14e416a2f3f73c38116bc8415
SHA5120ee13e2aacc51033e9c04d682a138a832bb1a9d80f7f262ccf564a4c37ca7ddeda0f24205d4483943ecd673201f101e9a4b5344becfb38126803422eec33665b