Analysis
-
max time kernel
151s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
29/12/2023, 22:45
Static task
static1
Behavioral task
behavioral1
Sample
0601bbf81cb7ab4aa18a55d9086f636e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0601bbf81cb7ab4aa18a55d9086f636e.exe
Resource
win10v2004-20231215-en
General
-
Target
0601bbf81cb7ab4aa18a55d9086f636e.exe
-
Size
61KB
-
MD5
0601bbf81cb7ab4aa18a55d9086f636e
-
SHA1
77cb5557dc22dba7d17959994914288f8c652274
-
SHA256
8fb843ba497dfa1f6020cd072322efd3260b8b284423631aeda1d8712288c878
-
SHA512
20dc5ade693ff65db105a91f76d97bb04efa41e3943b32d83a86645d9acb0e7d82ade725253b75496deea606a93284dda052dad4e553f93504bf54d4edc9ad50
-
SSDEEP
1536:xRw1zNZQaeG0wiIyZd2iQqGu4oyI2OxhAIMFsOIDT6dm:xRwlnQnG0wiIy4uMIrxTc
Malware Config
Signatures
-
Modifies AppInit DLL entries 2 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 2976 RunDll32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-983843758-932321429-1636175382-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\System Canvas = "RunDll32 \"C:\\Windows\\appcompat\\etloglsa.dll\",Init" 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\sppui\svcmslog.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File created C:\Windows\SysWOW64\RasToast\loglsa.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File opened for modification C:\Windows\SysWOW64\RasToast\loglsa.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File created C:\Windows\SysWOW64\sppui\svcmslog.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\appcompat\etloglsa.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe File opened for modification C:\Windows\appcompat\etloglsa.dll 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Enumerates system info in registry 2 TTPs 12 IoCs
description ioc Process Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key enumerated \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter 0601bbf81cb7ab4aa18a55d9086f636e.exe Key created \REGISTRY\MACHINE\HARDWARE\Description\System\MultifunctionAdapter\0 0601bbf81cb7ab4aa18a55d9086f636e.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\MultifunctionAdapter\0\DiskController\0\DiskPeripheral\0\Identifier 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 556 0601bbf81cb7ab4aa18a55d9086f636e.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 556 wrote to memory of 2976 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 91 PID 556 wrote to memory of 2976 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 91 PID 556 wrote to memory of 2976 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 91 PID 556 wrote to memory of 2536 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 59 PID 556 wrote to memory of 2536 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 59 PID 556 wrote to memory of 2552 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 58 PID 556 wrote to memory of 2552 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 58 PID 556 wrote to memory of 2704 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 16 PID 556 wrote to memory of 2704 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 16 PID 556 wrote to memory of 3232 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 52 PID 556 wrote to memory of 3232 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 52 PID 556 wrote to memory of 3508 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 50 PID 556 wrote to memory of 3508 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 50 PID 556 wrote to memory of 3756 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 49 PID 556 wrote to memory of 3756 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 49 PID 556 wrote to memory of 3864 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 48 PID 556 wrote to memory of 3864 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 48 PID 556 wrote to memory of 3968 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 21 PID 556 wrote to memory of 3968 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 21 PID 556 wrote to memory of 4048 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 47 PID 556 wrote to memory of 4048 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 47 PID 556 wrote to memory of 4176 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 46 PID 556 wrote to memory of 4176 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 46 PID 556 wrote to memory of 4880 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 34 PID 556 wrote to memory of 4880 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 34 PID 556 wrote to memory of 2936 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 32 PID 556 wrote to memory of 2936 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 32 PID 556 wrote to memory of 936 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 23 PID 556 wrote to memory of 936 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 23 PID 556 wrote to memory of 4944 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 26 PID 556 wrote to memory of 4944 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 26 PID 556 wrote to memory of 3664 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 89 PID 556 wrote to memory of 3664 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 89 PID 556 wrote to memory of 924 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 90 PID 556 wrote to memory of 924 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 90 PID 556 wrote to memory of 2976 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 91 PID 556 wrote to memory of 2976 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 91 PID 556 wrote to memory of 2296 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 104 PID 556 wrote to memory of 2296 556 0601bbf81cb7ab4aa18a55d9086f636e.exe 104
Processes
-
C:\Windows\system32\taskhostw.exetaskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}1⤵PID:2704
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3968
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:App.AppX53ypgrj20bgndg05hj3tc7z654myszwp.mca1⤵PID:936
-
C:\Windows\system32\backgroundTaskHost.exe"C:\Windows\system32\backgroundTaskHost.exe" -ServerName:CortanaUI.AppX3bn25b6f886wmg6twh46972vprk9tnbf.mca1⤵PID:4944
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:2936
-
C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe"C:\Windows\SystemApps\MicrosoftWindows.Client.CBS_cw5n1h2txyewy\InputApp\TextInputHost.exe" -ServerName:InputApp.AppX9jnwykgrccxc8by3hsrsh07r423xzvav.mca1⤵PID:4880
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:4176
-
C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe"C:\Windows\SystemApps\Microsoft.Windows.Search_cw5n1h2txyewy\SearchApp.exe" -ServerName:CortanaUI.AppX8z9r6jm96hw4bsbneegw0kyxx296wr9t.mca1⤵PID:4048
-
C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe"C:\Windows\SystemApps\Microsoft.Windows.StartMenuExperienceHost_cw5n1h2txyewy\StartMenuExperienceHost.exe" -ServerName:App.AppXywbrabmsek0gm3tkwpr5kwzbs55tkqay.mca1⤵PID:3864
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:3756
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k ClipboardSvcGroup -p -s cbdhsvc1⤵PID:3508
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3232
-
C:\Users\Admin\AppData\Local\Temp\0601bbf81cb7ab4aa18a55d9086f636e.exe"C:\Users\Admin\AppData\Local\Temp\0601bbf81cb7ab4aa18a55d9086f636e.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\RunDll32.exeRunDll32 "C:\Users\Admin\AppData\Local\Temp\8D9A.tmp",Init3⤵
- Loads dropped DLL
PID:2976
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k UnistackSvcGroup -s CDPUserSvc1⤵PID:2552
-
C:\Windows\system32\sihost.exesihost.exe1⤵PID:2536
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:3664
-
C:\Windows\System32\RuntimeBroker.exeC:\Windows\System32\RuntimeBroker.exe -Embedding1⤵PID:924
-
C:\Windows\system32\BackgroundTransferHost.exe"BackgroundTransferHost.exe" -ServerName:BackgroundTransferHost.11⤵PID:2296
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
58KB
MD5954ae278062ec5db4f5c1e2fcfa79905
SHA1a1f1ae731a955e4c688e5667981649baf47acada
SHA2564683241676f4974d0f5ad3aab04724f9953ca959b5eaf895cdc4db2778e4351b
SHA5122b750e5e63175d2c90c7e4e9a0f0074fd26e55341dfd8aabb7561985bc5508dbc6bb3ab7d5b2fa135676f6490203b58f3236775af1fda869ec89936003c3f471