Analysis
-
max time kernel
143s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
04-02-2024 05:05
Static task
static1
Behavioral task
behavioral1
Sample
8e49407f818f9f343010ec948ceb32c3.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
8e49407f818f9f343010ec948ceb32c3.exe
Resource
win10v2004-20231215-en
General
-
Target
8e49407f818f9f343010ec948ceb32c3.exe
-
Size
52KB
-
MD5
8e49407f818f9f343010ec948ceb32c3
-
SHA1
9bd466b756cf4454437f5cdde4443dd3a8222017
-
SHA256
279a90f79f05c36134a542ba4297df3799fc4869818828d1768d47a34b53deef
-
SHA512
9fe5b174e1b384a989037212f7e7041ff9154eb0a06ec3b17907abdd25bcc6bf6af69395104d0ce693c1016cbcea588042fa661209a6d5f5ed47a2e3d3190923
-
SSDEEP
768:2iln/zREBzqhn4AiWUzrfbispgN3crB58Zez57tpydMUq:h1EB65fUzrjiFM15eW7KdMz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe" svchost.exe -
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Local\Temp\svchost.exe = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svchost.exe:*:Enabled:svchost.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2604 svchost.exe 2748 svchost.exe -
Loads dropped DLL 3 IoCs
pid Process 2092 cmd.exe 2092 cmd.exe 2604 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 776 set thread context of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 2604 set thread context of 2748 2604 svchost.exe 34 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 776 8e49407f818f9f343010ec948ceb32c3.exe 2604 svchost.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 776 wrote to memory of 1752 776 8e49407f818f9f343010ec948ceb32c3.exe 28 PID 1752 wrote to memory of 2412 1752 8e49407f818f9f343010ec948ceb32c3.exe 29 PID 1752 wrote to memory of 2412 1752 8e49407f818f9f343010ec948ceb32c3.exe 29 PID 1752 wrote to memory of 2412 1752 8e49407f818f9f343010ec948ceb32c3.exe 29 PID 1752 wrote to memory of 2412 1752 8e49407f818f9f343010ec948ceb32c3.exe 29 PID 1752 wrote to memory of 2092 1752 8e49407f818f9f343010ec948ceb32c3.exe 31 PID 1752 wrote to memory of 2092 1752 8e49407f818f9f343010ec948ceb32c3.exe 31 PID 1752 wrote to memory of 2092 1752 8e49407f818f9f343010ec948ceb32c3.exe 31 PID 1752 wrote to memory of 2092 1752 8e49407f818f9f343010ec948ceb32c3.exe 31 PID 2092 wrote to memory of 2604 2092 cmd.exe 33 PID 2092 wrote to memory of 2604 2092 cmd.exe 33 PID 2092 wrote to memory of 2604 2092 cmd.exe 33 PID 2092 wrote to memory of 2604 2092 cmd.exe 33 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34 PID 2604 wrote to memory of 2748 2604 svchost.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe"C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exeC:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe2⤵
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.execmd /c copy "C:\Users\Admin\AppData\Local\Temp\8e49407f818f9f343010ec948ceb32c3.exe" "C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵PID:2412
-
-
C:\Windows\SysWOW64\cmd.execmd /c "C:\Users\Admin\AppData\Local\Temp\svchost.exe"3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\svchost.exeC:\Users\Admin\AppData\Local\Temp\svchost.exe5⤵
- Modifies WinLogon for persistence
- Modifies firewall policy service
- Executes dropped EXE
PID:2748
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Winlogon Helper DLL
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
52KB
MD58e49407f818f9f343010ec948ceb32c3
SHA19bd466b756cf4454437f5cdde4443dd3a8222017
SHA256279a90f79f05c36134a542ba4297df3799fc4869818828d1768d47a34b53deef
SHA5129fe5b174e1b384a989037212f7e7041ff9154eb0a06ec3b17907abdd25bcc6bf6af69395104d0ce693c1016cbcea588042fa661209a6d5f5ed47a2e3d3190923