Analysis

  • max time kernel
    150s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    15/03/2024, 23:34

General

  • Target

    c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe

  • Size

    152KB

  • MD5

    c68413ba02423ad3d7ae2cd9ebeda7a4

  • SHA1

    1e76981b20ec3e2fa08d6d4b800a81f1034066e8

  • SHA256

    c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc

  • SHA512

    ad627d025b2c89f39851e509b779a4203cd2ee8214908d48b4ec36ccf605e81fb6d0f3534768ac4f38afd1ae6056adc1410bf0ec0bdd7ab3c08708fb0fceb36e

  • SSDEEP

    3072:Fru5SkB2ca09lIqb5nr5JYpQ4O8k99K//RLbyVZtde:5oSkB2R09l9b5ntD4LKS/6de

Score
10/10

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Modifies WinLogon 2 TTPs 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious behavior: RenamesItself 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe
    "C:\Users\Admin\AppData\Local\Temp\c1c3d767c14a480f895a9a9b27f37403a5895e37a330a37c2243c0d91f08a7bc.exe"
    1⤵
    • Modifies WinLogon
    • Drops file in Windows directory
    • Suspicious behavior: RenamesItself
    • Suspicious use of WriteProcessMemory
    PID:1536
    • C:\Windows\apppatch\svchost.exe
      "C:\Windows\apppatch\svchost.exe"
      2⤵
      • Modifies WinLogon for persistence
      • Executes dropped EXE
      • Modifies WinLogon
      • Suspicious behavior: EnumeratesProcesses
      PID:4128

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Windows\apppatch\svchost.exe

          Filesize

          152KB

          MD5

          933c7bd13f69af800e7c825f8ad92416

          SHA1

          5b7203eeb1cacd2b0b946e1239d5489344bb323c

          SHA256

          169cee775f2a3245d19d6e72c5f400ee4b61464a9ed149a9e47c709020a6b17e

          SHA512

          aaba1ab54218b10e5f3f7f4908aff537449ba03f075b7e9376be2f5d1b697ac5c68cca2e10125df6f1b69ea5893813daf6601f572504e649ba88e70dfd9af7cf

        • memory/1536-0-0x00000000021A0000-0x00000000021D9000-memory.dmp

          Filesize

          228KB

        • memory/1536-1-0x0000000000400000-0x0000000000445000-memory.dmp

          Filesize

          276KB

        • memory/1536-11-0x00000000021A0000-0x00000000021D9000-memory.dmp

          Filesize

          228KB

        • memory/1536-12-0x0000000000400000-0x0000000000445000-memory.dmp

          Filesize

          276KB

        • memory/4128-13-0x0000000002960000-0x00000000029A6000-memory.dmp

          Filesize

          280KB

        • memory/4128-14-0x0000000002AF0000-0x0000000002B3A000-memory.dmp

          Filesize

          296KB

        • memory/4128-16-0x0000000002AF0000-0x0000000002B3A000-memory.dmp

          Filesize

          296KB

        • memory/4128-17-0x0000000002AF0000-0x0000000002B3A000-memory.dmp

          Filesize

          296KB

        • memory/4128-18-0x0000000002AF0000-0x0000000002B3A000-memory.dmp

          Filesize

          296KB

        • memory/4128-21-0x0000000002AF0000-0x0000000002B3A000-memory.dmp

          Filesize

          296KB

        • memory/4128-22-0x0000000000400000-0x0000000000445000-memory.dmp

          Filesize

          276KB