Analysis

  • max time kernel
    161s
  • max time network
    168s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231215-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system
  • submitted
    30/12/2023, 18:49

General

  • Target

    353d4e92b98f4ff46a1559f8f2f23e2d.exe

  • Size

    150KB

  • MD5

    353d4e92b98f4ff46a1559f8f2f23e2d

  • SHA1

    525ebc52d796fd8d32a42844ebff603c37cc6641

  • SHA256

    3f63b0136b5afb1e29d8dc6d9755d85139291355ce0889139164bcc87f2ddf38

  • SHA512

    51f88883d1a08c520e747d24dd964440aa1c33250a125511820503ddaf1e5f6240ebf31d791e3a7ae70c3d9883fe86cb699f5b987d1c50794f207cfb55849c56

  • SSDEEP

    3072:VuuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:VlcEY3iLXXgvRG5TFZoFQaMrHX

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\353d4e92b98f4ff46a1559f8f2f23e2d.exe
    "C:\Users\Admin\AppData\Local\Temp\353d4e92b98f4ff46a1559f8f2f23e2d.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:220
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:1088

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Windows\apppatch\svchost.exe

    Filesize

    150KB

    MD5

    a4498baa5b9733cd14438414d563a98e

    SHA1

    fed0f0659bccdc8b0ad63a2ea544392fd24e21d6

    SHA256

    a22cfa593082f6562e3e51a99cc7e7dcbc03ee195444a13c47fadd8f6238b980

    SHA512

    eddff648c7740098ba090fe902fccc72d327a5abea9c0432146a588eaf89e0df83c84e91c9cf855b2bce0b74a78acbc638af8adcb138d128b6ebe40083909bf8

  • memory/220-0-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/220-1-0x0000000002190000-0x00000000021C9000-memory.dmp

    Filesize

    228KB

  • memory/220-2-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/220-14-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/220-13-0x0000000002190000-0x00000000021C9000-memory.dmp

    Filesize

    228KB

  • memory/1088-17-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/1088-15-0x0000000002740000-0x0000000002786000-memory.dmp

    Filesize

    280KB

  • memory/1088-12-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1088-19-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/1088-20-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/1088-21-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/1088-22-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/1088-24-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB

  • memory/1088-25-0x0000000000400000-0x000000000044E000-memory.dmp

    Filesize

    312KB

  • memory/1088-27-0x0000000002B00000-0x0000000002B4A000-memory.dmp

    Filesize

    296KB