Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
15-03-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe
Resource
win10v2004-20231215-en
General
-
Target
31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe
-
Size
462KB
-
MD5
be0b4724083c53f7faeca44b6f6f3522
-
SHA1
95940680c71d8ad0e1d978e02aefa1a2b8565937
-
SHA256
31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea
-
SHA512
ce8d8851a50ca270238a8d46c8d13e6d1e01deb677d0b68fe07fd723c68f7d1302ad6776c135541f78968c606d51bdf1bb4fcca3d5ba02e481e400c43dbd33ad
-
SSDEEP
12288:gmWhND9yJz+b1FcMLmp2ATTSsdiDY4hIq0rBW90N:gmUNJyJqb1FcMap2ATT5gDY4hIq09W9O
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 632 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\99a555ac = "C\x12#ëß\n}Ö{\x1dü²0¶Ãrô\fY4/\"’^æÊ,:ºÛLØñÏ\x04T©|<\x18F³ùÌ°8ÿôŸ—§©¹ÄÙOС¸&\x0fq–\x01¦‡|©ÔùA8Áë€<†`©Áü{t¡$Á\\Q×Ñ¡\u0081Ì" 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\99a555ac = "C\x12#ëß\n}Ö{\x1dü²0¶Ãrô\fY4/\"’^æÊ,:ºÛLØñÏ\x04T©|<\x18F³ùÌ°8ÿôŸ—§©¹ÄÙOС¸&\x0fq–\x01¦‡|©ÔùA8Áë€<†`©Áü{t¡$Á\\Q×Ñ¡\u0081Ì" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe File opened for modification C:\Windows\apppatch\svchost.exe 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe 632 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1452 wrote to memory of 632 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 85 PID 1452 wrote to memory of 632 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 85 PID 1452 wrote to memory of 632 1452 31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe"C:\Users\Admin\AppData\Local\Temp\31ce272643fda83601e32fbdcc8efaba3316f3034c7e3e2c985f7c54745fe7ea.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:632
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
22KB
MD53cda7a9c9ed6dac73c3c813004c8d28c
SHA1b9d79c47d91b1f65a46795b06c5edda7eb001bd3
SHA25632497ad4a21096adb662780647f871110223034c36e0add773e19f72048dbd6b
SHA5123ef715bdc7127dbb370030d905341ec98ac750af94b781d89b74ab18dd0f3056ccc83bf9f7f56021757eedb1cb733530c3aab58bd1420d7a1f1be6f48326c291
-
Filesize
2KB
MD5f1ff396fe144e258b929d9e7dc16f32f
SHA1e169c202db56d6e587b18bd6d5c54de8657c6f81
SHA2567408d96494f9e23b602f2c148b0143d535bb00aaf0d1728a0d152ea706f2275e
SHA5123dd6be6c2014d3ed918cd5cc9709fee8cc0b36322bcc3d5282c2ab5d79f5bd4351ef0532cd6d1ba2fc3dfea5d46912ad5c32acac74ee62f01c0f2d7add8bedad
-
Filesize
42KB
MD55074ea678620e1297ae0c0dd27e3719b
SHA1c096e65abe65cd8aa2ce4e3fd6732fe8dcd574af
SHA256b1d1ffbec26e930dd42c0874d6e65d7ff799567cd53a9e63ab305635f27b56e0
SHA512ec8651c38d17f8f58d10c030ce2338a98a105791d2c8140e8137ddc2536161b717383acaaf6a027653ae6958f2fa6e2e086db1a060ed64232644d3739ba82cda
-
Filesize
42KB
MD5450f6bfcc53a679f874ef5ed5ef8998f
SHA14855ab7120ba7e593267f11f83fe08b3a13dd8e5
SHA256da7686f7732f71f6709a3a29a744c45947470b0481ee2e07416463b4a473af51
SHA51270d597cf796e9602db6439bd015e4968c13f72ca433ff46c182be78c50dd09559c974cfed9f6806881c945c2eb3c1beb647889320b297145a6a344a7fad4e766
-
Filesize
462KB
MD5216a97ef1c5ad9f2d5e483b981b465e5
SHA1e648e0b427da9427af4144312554b9a95448ccd1
SHA2565cb6b039f90fadef9c4932ed66948260c364f56c479d124219970d5cabc811e7
SHA51223bbeacb18db117d754e928e6f22abea1f1b88b2c83ac0f7cb84a2b3fdfaed371342159a4f73ca8c5d6663bcb148b6ada9a61eec3eb28243fd553310f0d38246