Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
15/03/2024, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
Resource
win10v2004-20240226-en
General
-
Target
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
-
Size
152KB
-
MD5
c68413ba02423ad3d7ae2cd9ebeda7a4
-
SHA1
1e76981b20ec3e2fa08d6d4b800a81f1034066e8
-
SHA256
c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc
-
SHA512
ad627d025b2c89f39851e509b779a4203cd2ee8214908d48b4ec36ccf605e81fb6d0f3534768ac4f38afd1ae6056adc1410bf0ec0bdd7ab3c08708fb0fceb36e
-
SSDEEP
3072:Fru5SkB2ca09lIqb5nr5JYpQ4O8k99K//RLbyVZtde:5oSkB2R09l9b5ntD4LKS/6de
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4128 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a24727bf = "C:\\Windows\\apppatch\\svchost.exe" c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a24727bf = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe File opened for modification C:\Windows\apppatch\svchost.exe c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4128 svchost.exe 4128 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1536 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1536 wrote to memory of 4128 1536 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 89 PID 1536 wrote to memory of 4128 1536 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 89 PID 1536 wrote to memory of 4128 1536 c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe"C:\Users\Admin\AppData\Local\Temp\c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1536 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4128
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
152KB
MD5933c7bd13f69af800e7c825f8ad92416
SHA15b7203eeb1cacd2b0b946e1239d5489344bb323c
SHA256169cee775f2a3245d19d6e72c5f400ee4b61464a9ed149a9e47c709020a6b17e
SHA512aaba1ab54218b10e5f3f7f4908aff537449ba03f075b7e9376be2f5d1b697ac5c68cca2e10125df6f1b69ea5893813daf6601f572504e649ba88e70dfd9af7cf