Analysis
-
max time kernel
161s -
max time network
168s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 18:49
Static task
static1
Behavioral task
behavioral1
Sample
353d4e92b98f4ff46a1559f8f2f23e2d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
353d4e92b98f4ff46a1559f8f2f23e2d.exe
Resource
win10v2004-20231215-en
General
-
Target
353d4e92b98f4ff46a1559f8f2f23e2d.exe
-
Size
150KB
-
MD5
353d4e92b98f4ff46a1559f8f2f23e2d
-
SHA1
525ebc52d796fd8d32a42844ebff603c37cc6641
-
SHA256
3f63b0136b5afb1e29d8dc6d9755d85139291355ce0889139164bcc87f2ddf38
-
SHA512
51f88883d1a08c520e747d24dd964440aa1c33250a125511820503ddaf1e5f6240ebf31d791e3a7ae70c3d9883fe86cb699f5b987d1c50794f207cfb55849c56
-
SSDEEP
3072:VuuczBGY3j4nLXhfRf70MCRRb85TFcMo7xQGHMOfAVTzXW:VlcEY3iLXXgvRG5TFZoFQaMrHX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1088 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\29aacd9 = "C:\\Windows\\apppatch\\svchost.exe" 353d4e92b98f4ff46a1559f8f2f23e2d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\29aacd9 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 353d4e92b98f4ff46a1559f8f2f23e2d.exe File opened for modification C:\Windows\apppatch\svchost.exe 353d4e92b98f4ff46a1559f8f2f23e2d.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe 1088 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 220 353d4e92b98f4ff46a1559f8f2f23e2d.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 220 wrote to memory of 1088 220 353d4e92b98f4ff46a1559f8f2f23e2d.exe 89 PID 220 wrote to memory of 1088 220 353d4e92b98f4ff46a1559f8f2f23e2d.exe 89 PID 220 wrote to memory of 1088 220 353d4e92b98f4ff46a1559f8f2f23e2d.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\353d4e92b98f4ff46a1559f8f2f23e2d.exe"C:\Users\Admin\AppData\Local\Temp\353d4e92b98f4ff46a1559f8f2f23e2d.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:220 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1088
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
150KB
MD5a4498baa5b9733cd14438414d563a98e
SHA1fed0f0659bccdc8b0ad63a2ea544392fd24e21d6
SHA256a22cfa593082f6562e3e51a99cc7e7dcbc03ee195444a13c47fadd8f6238b980
SHA512eddff648c7740098ba090fe902fccc72d327a5abea9c0432146a588eaf89e0df83c84e91c9cf855b2bce0b74a78acbc638af8adcb138d128b6ebe40083909bf8