Analysis
-
max time kernel
141s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
23/04/2024, 05:53
Static task
static1
Behavioral task
behavioral1
Sample
f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe
Resource
win10v2004-20240412-en
General
-
Target
f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe
-
Size
244KB
-
MD5
65096b8002049fc64527f8ed57518af0
-
SHA1
9f3bb38c00c54c93c69649f1df9373864615c083
-
SHA256
f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57
-
SHA512
31dba3c8e6e6c6b1a703fa7adfc3cc371e23b356b5bfeee243d053b813019e9071f24487c4e8a5caf0a624c6d53fd75e7617d0658accb825dd25b0f38bc6eefe
-
SSDEEP
6144:kEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:RAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3060 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe 2624 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\bb44fad4 = "C:\\Windows\\apppatch\\svchost.exe" f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\bb44fad4 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe File opened for modification C:\Windows\apppatch\svchost.exe f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2624 3060 WerFault.exe 28 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3060 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2024 wrote to memory of 3060 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe 28 PID 2024 wrote to memory of 3060 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe 28 PID 2024 wrote to memory of 3060 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe 28 PID 2024 wrote to memory of 3060 2024 f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe 28 PID 3060 wrote to memory of 2624 3060 svchost.exe 29 PID 3060 wrote to memory of 2624 3060 svchost.exe 29 PID 3060 wrote to memory of 2624 3060 svchost.exe 29 PID 3060 wrote to memory of 2624 3060 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe"C:\Users\Admin\AppData\Local\Temp\f7ca7e88fd3e5334f9b0ba93ad90b87102530327a4d706612244c6fe1682bd57.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3060 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 3563⤵
- Loads dropped DLL
- Program crash
PID:2624
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5658b153290d272f9750ea610b6b6a466
SHA10a6498722e1c30755a2fcaeecd752c440541498d
SHA2569cda300e15d4968dfc2a2a5f7e65156ec1a72a669c8a11bb60f68a12ef5574df
SHA5127914d21d3438834ff5ec7cd5c3fbdf91beaf81e194921d96341fae4feb51820cfe9e0850ebb145f4c8f6ba8ece58dd14d63bc53b016c23cf3ab9918a1f637ffe