Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
25-12-2023 07:18
Static task
static1
Behavioral task
behavioral1
Sample
0e33b04b1ccc7eb3891363b18af1907d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0e33b04b1ccc7eb3891363b18af1907d.exe
Resource
win10v2004-20231215-en
General
-
Target
0e33b04b1ccc7eb3891363b18af1907d.exe
-
Size
210KB
-
MD5
0e33b04b1ccc7eb3891363b18af1907d
-
SHA1
4e6a8ddd87bb7ba6e9aa77c268d9e277d917cca9
-
SHA256
1224f386d990ed1d2406087114c2420951fb7b2095199a2f0c559e8a14b2af01
-
SHA512
18fd5bcc7ea5b031f8452be7712b24de823e6fa93d0db12b4f79714887f6327f9468fbcf94d1ba1a736e951b83dbe385a9c9956380093511f1a98b3a5f2c0a6a
-
SSDEEP
3072:Ht+o2adNnckCfKpqLUJFmjoKzLCeGB1lNIX3fWjKAkNCZs9I8ByLJOdEtuEuNrBk:n2KpBuZef1onf2KAg/9I8Id9MEuq+b
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4072 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\35d8e392 = "õ;H\x14dØ_\bãr›ï£o+€r\x0fæצ\b\b\x17ój\x130–\x1fÈÇ\x06¼÷žÉnk½îk‘õÄÁ-\x7f}]ó…ž&Ôù\rn6Üe\x0fw>nü\x7f>ÞI¹fg\x06\x14VŒ‹\f_£+œùÞ£™ÞÜÓy¡£I/\x15ÿ~þ¾Ä\x1955e·©¤\x1dÖË\x146¾o6n«\x0e&íaTÁ[üÞ¹mK\x0eÓÆÏæ_Ï£3ÞƒŸ+ÆfÞ,ùžC“¼ƒ¶NŽ‰ÆŒ»6\x156k£\x19¡»Ý˶\x1fûT$‡ŽG?ã<Ääï!,®$ÛŒak\v\x13ovŒ6öF\u0081vö—M÷V#\u008d\x05ƒ¤½Y/)-9\x0eö\u00ad¶\x11ëܳ‹DF\x15Ä™‘ŸùFëuáËÍs\x0e«#ƒü®\x15«\u009dÌf¶#\x17W]F." 0e33b04b1ccc7eb3891363b18af1907d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\35d8e392 = "õ;H\x14dØ_\bãr›ï£o+€r\x0fæצ\b\b\x17ój\x130–\x1fÈÇ\x06¼÷žÉnk½îk‘õÄÁ-\x7f}]ó…ž&Ôù\rn6Üe\x0fw>nü\x7f>ÞI¹fg\x06\x14VŒ‹\f_£+œùÞ£™ÞÜÓy¡£I/\x15ÿ~þ¾Ä\x1955e·©¤\x1dÖË\x146¾o6n«\x0e&íaTÁ[üÞ¹mK\x0eÓÆÏæ_Ï£3ÞƒŸ+ÆfÞ,ùžC“¼ƒ¶NŽ‰ÆŒ»6\x156k£\x19¡»Ý˶\x1fûT$‡ŽG?ã<Ääï!,®$ÛŒak\v\x13ovŒ6öF\u0081vö—M÷V#\u008d\x05ƒ¤½Y/)-9\x0eö\u00ad¶\x11ëܳ‹DF\x15Ä™‘ŸùFëuáËÍs\x0e«#ƒü®\x15«\u009dÌf¶#\x17W]F." svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 0e33b04b1ccc7eb3891363b18af1907d.exe File opened for modification C:\Windows\apppatch\svchost.exe 0e33b04b1ccc7eb3891363b18af1907d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe 4072 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4456 0e33b04b1ccc7eb3891363b18af1907d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4456 wrote to memory of 4072 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 23 PID 4456 wrote to memory of 4072 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 23 PID 4456 wrote to memory of 4072 4456 0e33b04b1ccc7eb3891363b18af1907d.exe 23
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e33b04b1ccc7eb3891363b18af1907d.exe"C:\Users\Admin\AppData\Local\Temp\0e33b04b1ccc7eb3891363b18af1907d.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4456 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4072
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ea3be86077d2394bbad45ab5425bdb3e
SHA13cb66b45f92fc74756feb9661aaa94a2e37184c2
SHA2561e9627c21372fa75a5e3842880d851822ea3c6a1f532b67d8e48aedc105c7256
SHA512f47a98a9d067c7d005068f669bc810a4f6b64a8377113d2e1decd05062f087702e23eb469452da03db89dd1c2e2a5c117ede79e4276e04450768044412487005
-
Filesize
22KB
MD510775d12d58f67c15f41a9cf2a8c136a
SHA1f8de104b43ff4de3e6428253c9afb0b09d21ceba
SHA256257f80901588370118d6d2270d298f93d864945b177d9cdd5933dfddc3a86172
SHA51247fe03082f80938310223a093f9e721a9b5d5a333862e4f7a9ffd54f6d3920966bad83545d46e499e692051027360ab8d0ada17982220683b7a5f096e66b9de3
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
210KB
MD5ed945eabc57b08173a57149e2b808ac3
SHA1b51a040890836dd557f4f484d7b596db50561fc1
SHA2564fc70f3c2e766175bb840a5de7bcab8f047a927c940b3433333d30e8dd56ef94
SHA512b62387f8b8785e1d1779753aa2ea5e84109b2340a1e9f96ee7afa6db287d7f55f65b68d2634197273d196de878a51262de7d842d20a2123d2600171ee39c2649