Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
19/03/2024, 10:47
Static task
static1
Behavioral task
behavioral1
Sample
d5eb87079b33587754cea6d4f0411b9e.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
d5eb87079b33587754cea6d4f0411b9e.exe
Resource
win10v2004-20240226-en
General
-
Target
d5eb87079b33587754cea6d4f0411b9e.exe
-
Size
130KB
-
MD5
d5eb87079b33587754cea6d4f0411b9e
-
SHA1
436df1306e57d5ce5423c2927adcaa008e1dae42
-
SHA256
13086d2cbcf0b0cb99f165562049f90326e0ca57b4b4b12701f393d15f08fa85
-
SHA512
48023c89de4782bf7b7820f660d3f581a83d43ba712e8e9ea839316c38259ba59965fbab599f983c03d807e73a4d33aa7759c8b3cd4a5a7f2e0ad47cd463fc95
-
SSDEEP
3072:qUboH8STGbBby9ILYmLttldTsuZVGtB6Aili9ckw6:qVVGbBbSgttldT3vGtBzicTw6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = ",C:\\Program Files\\Windows Media Player\\svchost.exe," d5eb87079b33587754cea6d4f0411b9e.exe -
Executes dropped EXE 2 IoCs
pid Process 2500 svchost.exe 3712 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3712 svchost.exe 3712 svchost.exe -
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\SysWOW64\PDLL.dll svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2356 set thread context of 4560 2356 d5eb87079b33587754cea6d4f0411b9e.exe 86 PID 2500 set thread context of 3712 2500 svchost.exe 92 -
Drops file in Program Files directory 2 IoCs
description ioc Process File opened for modification C:\Program Files\Windows Media Player\svchost.exe d5eb87079b33587754cea6d4f0411b9e.exe File created C:\Program Files\Windows Media Player\svchost.exe d5eb87079b33587754cea6d4f0411b9e.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 4560 d5eb87079b33587754cea6d4f0411b9e.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 3712 svchost.exe 3712 svchost.exe 3712 svchost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2356 wrote to memory of 4560 2356 d5eb87079b33587754cea6d4f0411b9e.exe 86 PID 2356 wrote to memory of 4560 2356 d5eb87079b33587754cea6d4f0411b9e.exe 86 PID 2356 wrote to memory of 4560 2356 d5eb87079b33587754cea6d4f0411b9e.exe 86 PID 2356 wrote to memory of 4560 2356 d5eb87079b33587754cea6d4f0411b9e.exe 86 PID 2356 wrote to memory of 4560 2356 d5eb87079b33587754cea6d4f0411b9e.exe 86 PID 4560 wrote to memory of 3432 4560 d5eb87079b33587754cea6d4f0411b9e.exe 88 PID 4560 wrote to memory of 3432 4560 d5eb87079b33587754cea6d4f0411b9e.exe 88 PID 4560 wrote to memory of 3432 4560 d5eb87079b33587754cea6d4f0411b9e.exe 88 PID 4560 wrote to memory of 2500 4560 d5eb87079b33587754cea6d4f0411b9e.exe 90 PID 4560 wrote to memory of 2500 4560 d5eb87079b33587754cea6d4f0411b9e.exe 90 PID 4560 wrote to memory of 2500 4560 d5eb87079b33587754cea6d4f0411b9e.exe 90 PID 2500 wrote to memory of 3712 2500 svchost.exe 92 PID 2500 wrote to memory of 3712 2500 svchost.exe 92 PID 2500 wrote to memory of 3712 2500 svchost.exe 92 PID 2500 wrote to memory of 3712 2500 svchost.exe 92 PID 2500 wrote to memory of 3712 2500 svchost.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe"C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exeC:\Users\Admin\AppData\Local\Temp\d5eb87079b33587754cea6d4f0411b9e.exe2⤵
- Modifies WinLogon for persistence
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\$$c44F8.tmp.bat3⤵PID:3432
-
-
C:\Program Files\Windows Media Player\svchost.exe"C:\Program Files\Windows Media Player\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Program Files\Windows Media Player\svchost.exe"C:\Program Files\Windows Media Player\svchost.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3712
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD5d5eb87079b33587754cea6d4f0411b9e
SHA1436df1306e57d5ce5423c2927adcaa008e1dae42
SHA25613086d2cbcf0b0cb99f165562049f90326e0ca57b4b4b12701f393d15f08fa85
SHA51248023c89de4782bf7b7820f660d3f581a83d43ba712e8e9ea839316c38259ba59965fbab599f983c03d807e73a4d33aa7759c8b3cd4a5a7f2e0ad47cd463fc95
-
Filesize
233B
MD5f63cdfd0a8f3c10a9a870267482965b3
SHA159a4cc1ce534a8891b500eeb836fbab087e5dd1c
SHA256b3d056cf7a6e08b9b35b84b325c29e0cdb5158e3736afad34cb13e84795d1680
SHA512409a34d160639692d6b6c65eeeb894f598f34a5ef437a1a8fc223c52378097ebc9954907052bcff2ba650318e29773733956d320a4eaadb185c3e1706fc3c6a5
-
Filesize
70KB
MD56fad8497ad45422e9d472a8abc96aec2
SHA1f286b93f5d27f98fcf0fe2d802843072f3e344fb
SHA256dd0f0b18a13d37656c8ffc38ad4995cc7a37f885b039eba47b88986dcb2d5a16
SHA512a8c62a443ffa2f8dc1f707360edb5c308aaa1a24edf9c2d4797b9df3ae8a88a73ae53ad5dc266172db57c1356671991f0786fc8072c4bc96f4d941ad9e3efae2