Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
04/05/2024, 20:58
Static task
static1
Behavioral task
behavioral1
Sample
19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe
Resource
win10v2004-20240426-en
General
-
Target
19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe
-
Size
206KB
-
MD5
faaad026c687ab81a50855d64cbc965f
-
SHA1
d9dbd83687907a72a0c07e94950897dedc9f5102
-
SHA256
19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742
-
SHA512
d12d5b4ec03f64721ab6da5820a912c72286adb7c681cbe124f4feaaebfeab409b6e58be441d8495b394cfde12e486ca9553a38e981f7c0b63f7f4bdf9d632ac
-
SSDEEP
6144:o+EqFQ9A9ty5bhJcrs0MurPw/c4hd/B/coyXT3nOGX6T+:o+U9qyFhJy56d/eoyXjn9W+
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3956 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\6e73e65d = "C:\\Windows\\apppatch\\svchost.exe" 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe -
Drops file in Program Files directory 34 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe File opened for modification C:\Windows\apppatch\svchost.exe 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3571316656-3665257725-2415531812-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe 3956 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1140 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1140 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe Token: SeSecurityPrivilege 1140 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe Token: SeSecurityPrivilege 3956 svchost.exe Token: SeSecurityPrivilege 3956 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1140 wrote to memory of 3956 1140 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe 82 PID 1140 wrote to memory of 3956 1140 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe 82 PID 1140 wrote to memory of 3956 1140 19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe"C:\Users\Admin\AppData\Local\Temp\19b56ede186fd48bee8a49beeb001e65a07881408136f88912eeb0b5b35fb742.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3956
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
167B
MD50104c301c5e02bd6148b8703d19b3a73
SHA17436e0b4b1f8c222c38069890b75fa2baf9ca620
SHA256446a6087825fa73eadb045e5a2e9e2adf7df241b571228187728191d961dda1f
SHA51284427b656a6234a651a6d8285c103645b861a18a6c5af4abb5cb4f3beb5a4f0df4a74603a0896c7608790fbb886dc40508e92d5709f44dca05dd46c8316d15bf
-
Filesize
206KB
MD561056653165c24a08e54264e0f8f6a00
SHA11c53697e0cb2ed4d52dcfeb55038c3464159a8b3
SHA256477d096fd3590ad4323f7d6e643ee234d5ddfc970f8a6c5ebff1a65b32276de7
SHA51239cad82970567c753f15e3a45f8da8055841ebe829f796a8ab8d531abcf9485bfabe92ea8490ae1d5a43f10b3aa07e14be7167ebb68cba870e9a470b2dccc613