Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
15/05/2024, 01:13
Static task
static1
Behavioral task
behavioral1
Sample
21144e17b70bbefaec8a23346c302ed0.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
21144e17b70bbefaec8a23346c302ed0.exe
Resource
win10v2004-20240508-en
General
-
Target
21144e17b70bbefaec8a23346c302ed0.exe
-
Size
212KB
-
MD5
21144e17b70bbefaec8a23346c302ed0
-
SHA1
8cf1ab8c67eaed661b3f813df5c6ecbca66bf455
-
SHA256
1063a1ced29e0d2658e5b807e37690a433af13f64a62f2249e39c911560fb669
-
SHA512
af4396ca5dd6692ff81752accf9cc691d008b61c3b36440679cc52b96d4a35e55b7a122490c22de5a67532467ad67f8b57c5869822a41b84aeccb51124ae7f72
-
SSDEEP
6144:cxNqLW6opBZMU/y/JEGjg+op2BSNCCr7/jU:SA6NBT/yEGjWwa7vU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4984 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ff52aeff = "C:\\Windows\\apppatch\\svchost.exe" 21144e17b70bbefaec8a23346c302ed0.exe -
Drops file in Program Files directory 35 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 21144e17b70bbefaec8a23346c302ed0.exe File opened for modification C:\Windows\apppatch\svchost.exe 21144e17b70bbefaec8a23346c302ed0.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1337824034-2731376981-3755436523-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe 4984 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2588 21144e17b70bbefaec8a23346c302ed0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2588 21144e17b70bbefaec8a23346c302ed0.exe Token: SeSecurityPrivilege 2588 21144e17b70bbefaec8a23346c302ed0.exe Token: SeSecurityPrivilege 4984 svchost.exe Token: SeSecurityPrivilege 4984 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2588 wrote to memory of 4984 2588 21144e17b70bbefaec8a23346c302ed0.exe 84 PID 2588 wrote to memory of 4984 2588 21144e17b70bbefaec8a23346c302ed0.exe 84 PID 2588 wrote to memory of 4984 2588 21144e17b70bbefaec8a23346c302ed0.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\21144e17b70bbefaec8a23346c302ed0.exe"C:\Users\Admin\AppData\Local\Temp\21144e17b70bbefaec8a23346c302ed0.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
212KB
MD522e51e81329935b0739e81f7454dcb36
SHA1fbf188625de190540cddf8ea123ccf776f6f9d2a
SHA256b054b21818d40de1304b9076c0d6b452e0060d22be7ce9ea0ba9398f2446a8cc
SHA5123d883f82c929ba3a5859e84ff03d5ac7023950fc03d968a5faebaa3e2fbb2e1da07da233f4ab0a9d92eeaf6932b32bef04152eeacd0922885738e6266dfd5bd6