Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
30-04-2024 19:49
Static task
static1
Behavioral task
behavioral1
Sample
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
Resource
win10v2004-20240419-en
General
-
Target
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe
-
Size
204KB
-
MD5
75f8ce733b4af79554b4b84c643980ad
-
SHA1
4531f769404ed38bdf19195a1354e4a0ac8b4064
-
SHA256
20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12
-
SHA512
b35e4ab5a9d48fb71c8e66d225b4613c4ed0dddf765f6884faeefea03412a1b0ae65c0dfb16cbd247371a182100b2e1f9dffbbfd7b70b06ecc91f20a41cc326d
-
SSDEEP
3072:UdGaTPrrIGvvyy8dHSi+OcGMrOpOVKdOyMbkrWRdg+E2uEPczTinJhV+p9GEVFU/:OGazIc6TVBMrOpzeJEsuirSGEMpgE
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2444 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c52b6257 = "C:\\Windows\\apppatch\\svchost.exe" 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe File created C:\Windows\apppatch\svchost.exe 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2444 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe Token: SeSecurityPrivilege 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe Token: SeSecurityPrivilege 2444 svchost.exe Token: SeSecurityPrivilege 2444 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2444 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 28 PID 2924 wrote to memory of 2444 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 28 PID 2924 wrote to memory of 2444 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 28 PID 2924 wrote to memory of 2444 2924 20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe"C:\Users\Admin\AppData\Local\Temp\20bf75ec79b517943833f117a12421ff8b31cd4dd1c818f463bb35f0e1753c12.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2444
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55c396e3731b15312c7e6e0d5b18949d0
SHA1b9d1ed9e97379e1272751450b23dc310ff35d0a4
SHA25648590d90945024fb2db2866fa53c12257109e31f7d9f4302242e9d6dd3ba58a5
SHA5127e94a945d9b243c028e89ea274e49f49708a16c952f1b6e1359f0ebc1b6b7ce2be24e0d12a82c5a45d4a1fc96147625d7f6b8c7e6570f4fd4bc3d17d8ad9d21c
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
204KB
MD5eb8d12605e7222b4e3fdf71469fe1dcd
SHA19cba45e28d709d0f7093fe4584734fe8800d0258
SHA256fdd6ee5971c34a9705eb249a0cc0fd75e75f2c99e0ddb1070e26678082e1accf
SHA512b6a25598141ba72b19c3a0d67c52d852d7deba7686e10fc4d329e182d24cd0611feb52b302e90243be88c69f4a684e4e59007369a7540687e6025ecfdfbe88d7