Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
15/03/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
Resource
win10v2004-20240226-en
General
-
Target
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
-
Size
152KB
-
MD5
c68413ba02423ad3d7ae2cd9ebeda7a4
-
SHA1
1e76981b20ec3e2fa08d6d4b800a81f1034066e8
-
SHA256
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc
-
SHA512
ad627d025b2c89f39851e509b779a4203cd2ee8214908d48b4ec36ccf605e81fb6d0f3534768ac4f38afd1ae6056adc1410bf0ec0bdd7ab3c08708fb0fceb36e
-
SSDEEP
3072:Fru5SkB2ca09lIqb5nr5JYpQ4O8k99K//RLbyVZtde:5oSkB2R09l9b5ntD4LKS/6de
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1924 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\56426db3 = "C:\\Windows\\apppatch\\svchost.exe" c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\56426db3 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe File opened for modification C:\Windows\apppatch\svchost.exe c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe 1924 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 844 wrote to memory of 1924 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 28 PID 844 wrote to memory of 1924 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 28 PID 844 wrote to memory of 1924 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 28 PID 844 wrote to memory of 1924 844 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe"C:\Users\Admin\AppData\Local\Temp\c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:1924
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD518972506f087aa273c1b4d0a3c566968
SHA15055c2cd5f35db937b5c2c8160ba06d5f13877ea
SHA25682476eff7e28267575744c18b6c69083426382c8a428aaca3cc84958e309b6a2
SHA512cd5833520e4f0e4e3c8fe01993c79c1af2fa18c726495fea252e3bb9369e83f6b63915b8b1d1ffcc9a843d5fea618f87313f6941104dda9f73a0587b3c26c526