Analysis
-
max time kernel
136s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
12-02-2024 14:17
Static task
static1
Behavioral task
behavioral1
Sample
975b62dab787e8d2e537dd35950b2540.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
975b62dab787e8d2e537dd35950b2540.exe
Resource
win10v2004-20231215-en
General
-
Target
975b62dab787e8d2e537dd35950b2540.exe
-
Size
355KB
-
MD5
975b62dab787e8d2e537dd35950b2540
-
SHA1
463aaf6aaaa1534ebd1894fab50cebca5bc90bd4
-
SHA256
ff33c207cdf78dc7f1b8f3ba6998054439aaf1ad0608dbaed0b51e376da26caa
-
SHA512
99a948999b390d161c411a324e3811a65c07c547c0f761cde7a96cc94be9a9d331a691eacbaf5b9bbef0106470be2bcea87d8908f4b4ae67dc00d23b2e298cd3
-
SSDEEP
6144:w3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:LmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2188 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1652 975b62dab787e8d2e537dd35950b2540.exe 1652 975b62dab787e8d2e537dd35950b2540.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c5c0fba7 = "¤\x01ãÌR™/" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c5c0fba7 = "¤\x01ãÌR™/" 975b62dab787e8d2e537dd35950b2540.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 975b62dab787e8d2e537dd35950b2540.exe File opened for modification C:\Windows\apppatch\svchost.exe 975b62dab787e8d2e537dd35950b2540.exe -
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1652 975b62dab787e8d2e537dd35950b2540.exe 1652 975b62dab787e8d2e537dd35950b2540.exe 1652 975b62dab787e8d2e537dd35950b2540.exe 1652 975b62dab787e8d2e537dd35950b2540.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe 2188 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1652 975b62dab787e8d2e537dd35950b2540.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1652 wrote to memory of 2188 1652 975b62dab787e8d2e537dd35950b2540.exe 28 PID 1652 wrote to memory of 2188 1652 975b62dab787e8d2e537dd35950b2540.exe 28 PID 1652 wrote to memory of 2188 1652 975b62dab787e8d2e537dd35950b2540.exe 28 PID 1652 wrote to memory of 2188 1652 975b62dab787e8d2e537dd35950b2540.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\975b62dab787e8d2e537dd35950b2540.exe"C:\Users\Admin\AppData\Local\Temp\975b62dab787e8d2e537dd35950b2540.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1652 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2188
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD536b5bbf65cdc1eb773f8f0eea2f8d9de
SHA16f47a91c14ed32798cfd70a934f9a1f7d938729c
SHA2565531b00d621619cc4c46ac3227dfdcaf8d7a26351d0a190cc600b81b4478cf7d
SHA512700c02fcff3ce1d9ce525a52eb4f15922f98089094a0bce343b8d7a3a3d63479129c8c69d7d34612fb41c2c048eca43997672b891e9a4ffecb89dcf80d2a9fe8
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f5062cd093d12c69c70f4184288f4885
SHA17bedc20063feaa6ee1b77ec897560922a50c6936
SHA25605b4228101a741648e1a07276c1a37b0c3a4e3fca84f02f1cbd38ce5e30da02e
SHA512013032075de26c9694b7cf8a7182ff68e1b4315444e0978b1fcb2f8a9c7a19df640f47aa7b74d3b14286c0e408078f88b1901895082c39f4e069f9a005deafc7
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5ed9aef89120b752d9c472fd7793c0e58
SHA1526df4b6f9cf19a48476ae4bdf3da993cebad688
SHA2564d45b6f36fd3acb15cc1b7667e2b6c759777af60cc565f75be7f47beb1942af4
SHA512aedef16b3f0c039e5c1f236e3b7960c6de016f6d2b063eeedec24e3f3296e473358b425f27fefc651ed6efbba211891ca5d2d39b6c72534fca406324b0428c3e
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD59efcd88eb7f75848f06ca1241a7f4f5a
SHA12d591ca63d669a52a3b9f6361fea88492d8deb48
SHA256b7e75897001439da959db9b4b15aa17c70560e6a6b9cfdeac8a5d769ecae0163
SHA5120d319f71fd850bc67ddd78c08a2475bbc9e598417b8d2a40c2af8593531fe0f82a48cfd6b504158d88c20f634d2ff3817872a7194494f74620affe2333454a47
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD57c29176f602c6e53324d2c4fa0057aa2
SHA1c22336b018bf32096d53f78565f83d6d7da18916
SHA2564add8fc3e02810432cdb1b7cf22c80e056d2d8ebd958c711977c4da6c371400a
SHA512b9125c23d773420fa1f05016c95d643b1368d35797ae741aee69ad5a39380c1ce1b15407fb2bc0ced1e26babb26b81c2444533d577daa0ec5d9c8a97054652cd
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5b88ceb5291a4aebe701bd75299df0856
SHA1df270f78ecf935d5b268feeed68112af494ed213
SHA25643a80386925de850fe3afcfd0ac24271cebe0690f059e4170e8440fa4c27003e
SHA512ee128654dc70297cd5d0431b86ec0c446a0d3801458179fc54f11f68f0b99e3b740ffa49919904abfae59239b0a4b3d51213119cc3e3218a534f31e98e90f8ca
-
Filesize
1KB
MD543cada538b1dd7237be2c195962bfb60
SHA14dbe5bd5aec1f9c20cc7d0b67132d941f5ef06cb
SHA25613f56c908a64cde449c81cd25a552c8cdc2934a56577232dc0e0fedac90737ee
SHA512b6a9480b955b11f9a2bfe35cd757424ad94ea3dfa3134f055dc5d9deae4bf6f23c0b3b6b0323f0e45f7e199c3c7ff0290bd6e109004824185f843e11427025c1
-
Filesize
1KB
MD58539e3219f1f3baaff719c0f85c6f857
SHA15ee9b9dc1dc464cc80105e422b4b3507f7fd4b3e
SHA2566a1ef53888b327ec6372aac05b5191392436f83770062bd6e1defc69c349cbb5
SHA51235265b4765e7a366cf7e074b7e197c459e185a421b443239a2ac06c0ca9efb6c58e900948c30f62d31ebd1c8b479c6a33d89b089444f4f9b9f5aa114a1e41550
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
355KB
MD51a1ab02857474a92773ed8b996076d0e
SHA1538a8be5742d10f632a6cbebc6391b8adc2fc3a3
SHA256da801412b1f326102a1297495af3d21999ddf45544b4d200421992ccf7d86e1b
SHA512902931c420b636ce6df9ef4464edf9927a5e15692e294829ee2f4196a05a3eb23a048492368bfaa3d2f0294edd2f166ebdae932028d9c2f5534550fba81669b5