Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
Resource
win10v2004-20240508-en
General
-
Target
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
-
Size
212KB
-
MD5
0aa5806bf88cabf74c31f03f3a443be9
-
SHA1
a22ac0bd29f4dd7e79dd5382c02075975340459b
-
SHA256
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153
-
SHA512
4dd711ef8281e7eb1279c881fd7c2a8c014743a93eeb96d7bca3fab3a33e9b740996d785cc06aa0f701a1844c3f91711a17f0be8404900bdb98872816fb05050
-
SSDEEP
3072:hGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:hG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2284 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exepid process 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c199030c = "ù„ï{òò¨ƒó_×BCÖ{ÏJýŽ\x02kš7˜‰…ºš\x0eÈ\x0ebF3\x1b*\v„ühžŽS;®S¤šs¶\x04ÞkûN®Ž„\x18윈|ã\x18$#$~XÄS|ž«B®~¤®¤ã&¶Fž›P¬F6êÛDÃÂ|\x16F6ûÓn.k¦ôü¬\x03jÚ^n¶|£lÞLºó\x06’Dæd2~:$¼\u0090®‹k\x10¨DÄö\x03„{»ä*\vËîn–|T\x04\x13C“®«öû»äÌÞ\x1a”œ.\x1cv6ì¤\u00a0lÌÔt\u0090ÖîÜ\\ô`»ƒ6#\x1eŠ†›ä^ëÃôÜ–k\x10žžþ´&t\x1eh{Û#Ë\x1aËãF¾£\x10ÌPâèË#”ð\v³L`4¸›ŒÄz\x16K«ÄË[˜\n¦C«,ÜtÓö$äf" 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c199030c = "ù„ï{òò¨ƒó_×BCÖ{ÏJýŽ\x02kš7˜‰…ºš\x0eÈ\x0ebF3\x1b*\v„ühžŽS;®S¤šs¶\x04ÞkûN®Ž„\x18윈|ã\x18$#$~XÄS|ž«B®~¤®¤ã&¶Fž›P¬F6êÛDÃÂ|\x16F6ûÓn.k¦ôü¬\x03jÚ^n¶|£lÞLºó\x06’Dæd2~:$¼\u0090®‹k\x10¨DÄö\x03„{»ä*\vËîn–|T\x04\x13C“®«öû»äÌÞ\x1a”œ.\x1cv6ì¤\u00a0lÌÔt\u0090ÖîÜ\\ô`»ƒ6#\x1eŠ†›ä^ëÃôÜ–k\x10žžþ´&t\x1eh{Û#Ë\x1aËãF¾£\x10ÌPâèË#”ð\v³L`4¸›ŒÄz\x16K«ÄË[˜\n¦C«,ÜtÓö$äf" svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exedescription ioc process File opened for modification C:\Windows\apppatch\svchost.exe 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe File created C:\Windows\apppatch\svchost.exe 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe -
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exesvchost.exepid process 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe 2284 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exepid process 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exedescription pid process target process PID 2232 wrote to memory of 2284 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe PID 2232 wrote to memory of 2284 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe PID 2232 wrote to memory of 2284 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe PID 2232 wrote to memory of 2284 2232 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe"C:\Users\Admin\AppData\Local\Temp\4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2284
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD51a10f53f5b875eba7e0c2e4f9dcf7e4e
SHA1da578493c0e4b79268c4e123cbf5cb5676af9f83
SHA256e4dc70512aad20bcfeb8ae3f8d89443a5d78fe92f3f37ce71b107e2570eed186
SHA51227c22faf6aad5cf8f1e2948f6ac3d32e3d86d99d4e54be941ad6a1d25f8eed3b9cf19542d9ed68c0a8be0e8f168aa7e6bcf8847c773530da1a37f0a130248b03
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5f50c8dfaebc15d2baab537adfbfaec97
SHA1503ec9471dadcab7b5c0e1b386e2ed277d15dac7
SHA256d8ece1812381d776860e8bae36a93c75611fee4c0d6e7e0f2fb1cc5bef1bdaa6
SHA51216ef26d01240e6dc3f19379584b4e54bbf1adf745cd0cb53a253830cc7987f694e5ca63a1ecba76adfbd7f0a9da197ed225a705bac02f2ff9ce96242a0fa0149
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\MEFTDE7Q\login[2].htm
Filesize593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\SVBQZB4R\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
22KB
MD5003c4a75995e3360dddf7ee0f510fb60
SHA116bd2759a1b7bb8f295940cf12a1e5947f8c5004
SHA256ec180bae1ed081545a31df82ecfc407ec0753bc69bc0df6070ba4d388e7232cf
SHA51210325bb2823f64d8bf1e7f7bd31fd4df4c3748ff1cd906cc2522a6d6d72260ec264d549380ab68d329e67a2d89951f6f958bbb4416dc9bd4c0259c9f187bfcc2
-
Filesize
41KB
MD5fb0cd5127417bca77b2ab2c3db61218b
SHA167da8f68b603e520f7dda7e740d6721f46a262fe
SHA2561d3484ec739a6a0e712b3a2a7bd5d402397a67136ed85d0b62454a9daeca8ba7
SHA512d664570b94246ef99f93c6f3acdbdb49bd1b69533bc2316699f6f929b5f9ba2601305afb0a85f66cee159a51b3f514b5156c3f117cb23d182422bfac1f2bd7cc
-
Filesize
41KB
MD562b26df84ed22ca6858b6b003b6c8a6b
SHA152836a348f5a4cca353e9420bd3f5a97effcb3e1
SHA256e2353b711d78b6dff5fb3cf75defd95aa69ca3a31481f5bcc096135312e8b56f
SHA51253c81674906a9fbde0e536f4a929d099359dddc1efb1e11fc035e10820dbe4ce0d3065aa9293bd511275107fb8f3398eed913d80ca5b065dec4d38ec935e125d
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
212KB
MD5c677b9b5281ff9b060322b39f661789f
SHA16ef40da6cc487685a34a70e56e12b18efd329401
SHA256a666632be6fa5c8e7daf0b16c583484a33fb54684307f1f4f00b078521abd98a
SHA512209d0cc3c08a10b52b16709f5a722b186e87453fa17e3bdd8d5004ac4d5dd54317ea1ca3b39db61cfdf0147a4cbd85d9e01803f583c71ea4745ada67505ce65e