Analysis
-
max time kernel
150s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
15/05/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
21144e17b70bbefaec8a23346c302ed0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21144e17b70bbefaec8a23346c302ed0.exe
Resource
win10v2004-20240508-en
General
-
Target
21144e17b70bbefaec8a23346c302ed0.exe
-
Size
212KB
-
MD5
21144e17b70bbefaec8a23346c302ed0
-
SHA1
8cf1ab8c67eaed661b3f813df5c6ecbca66bf455
-
SHA256
1063a1ced29e0d2658e5b807e37690a433af13f64a62f2249e39c911560fb669
-
SHA512
af4396ca5dd6692ff81752accf9cc691d008b61c3b36440679cc52b96d4a35e55b7a122490c22de5a67532467ad67f8b57c5869822a41b84aeccb51124ae7f72
-
SSDEEP
6144:cxNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:SA6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3020 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2072 21144e17b70bbefaec8a23346c302ed0.exe 2072 21144e17b70bbefaec8a23346c302ed0.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c7158b7b = "C:\\Windows\\apppatch\\svchost.exe" 21144e17b70bbefaec8a23346c302ed0.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 21144e17b70bbefaec8a23346c302ed0.exe File opened for modification C:\Windows\apppatch\svchost.exe 21144e17b70bbefaec8a23346c302ed0.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2721934792-624042501-2768869379-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3020 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2072 21144e17b70bbefaec8a23346c302ed0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2072 21144e17b70bbefaec8a23346c302ed0.exe Token: SeSecurityPrivilege 2072 21144e17b70bbefaec8a23346c302ed0.exe Token: SeSecurityPrivilege 3020 svchost.exe Token: SeSecurityPrivilege 3020 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2072 wrote to memory of 3020 2072 21144e17b70bbefaec8a23346c302ed0.exe 28 PID 2072 wrote to memory of 3020 2072 21144e17b70bbefaec8a23346c302ed0.exe 28 PID 2072 wrote to memory of 3020 2072 21144e17b70bbefaec8a23346c302ed0.exe 28 PID 2072 wrote to memory of 3020 2072 21144e17b70bbefaec8a23346c302ed0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\21144e17b70bbefaec8a23346c302ed0.exe"C:\Users\Admin\AppData\Local\Temp\21144e17b70bbefaec8a23346c302ed0.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3020
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD5dff4e4deaf64415390388d1040fc732d
SHA197ecd31f3f047dc6b3843655b6ee594cb3aa89ad
SHA256faba86dfbc668c011be5fd770a13dd18379d5a0054d16661c49ed1ae82e7631d
SHA5121b636a53aabdddfce4c3381aafab46507150323fc85499265145eb349642ae8d9edf23e9c3e2197e1db79514660c2050fa8d73eab922532e4748f6b13b073a2f
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
212KB
MD50ffd911f9d9414cfcef3d19222fab8cf
SHA1cee6905a8626b7de9d8576bfbbb05661ccb8a144
SHA2561e36de248a5ea8d7b6930e2faf8dc3460220899cce527148c4e91e29296a6b20
SHA512b171e8788f155f2a3693eacdffc43a98cd6f8ce68ee591529d7b52ac95ed936a45f8833763e5b963f977167aeea96df4bb6aebaebd5fd68ad6c219a235364f2d