Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 21:30
Static task
static1
Behavioral task
behavioral1
Sample
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
Resource
win10v2004-20240508-en
General
-
Target
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe
-
Size
212KB
-
MD5
0aa5806bf88cabf74c31f03f3a443be9
-
SHA1
a22ac0bd29f4dd7e79dd5382c02075975340459b
-
SHA256
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153
-
SHA512
4dd711ef8281e7eb1279c881fd7c2a8c014743a93eeb96d7bca3fab3a33e9b740996d785cc06aa0f701a1844c3f91711a17f0be8404900bdb98872816fb05050
-
SSDEEP
3072:hGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:hG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2596 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5c326ed1 = "ÂÛMfÈ°‘\x0f\x1e¢\u00ad\vqÉ5g\n¾ñæâ\x14\x19*µ!†" 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5c326ed1 = "ÂÛMfÈ°‘\x0f\x1e¢\u00ad\vqÉ5g\n¾ñæâ\x14\x19*µ!†" svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exedescription ioc process File created C:\Windows\apppatch\svchost.exe 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe File opened for modification C:\Windows\apppatch\svchost.exe 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exesvchost.exepid process 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe 2596 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exepid process 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exedescription pid process target process PID 4756 wrote to memory of 2596 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe PID 4756 wrote to memory of 2596 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe PID 4756 wrote to memory of 2596 4756 4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe"C:\Users\Admin\AppData\Local\Temp\4e0d6fc57a6d5884a4de2a9942f37a4c7cb1a8454678dbe74d919be8cfe65153.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4756 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --field-trial-handle=3772,i,14486271492189381216,15799931579469722648,262144 --variations-seed-version --mojo-platform-channel-handle=4552 /prefetch:81⤵PID:4864
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
457B
MD527d3ea64ef0f44f8002f175950e3dedf
SHA145664f15cc95011360e6e0742ca70ca4443737c2
SHA256e06beacdcc1ad1cfbe80aadb8a62d04c80c45e0e603c63b2e4313bfc32b7f50c
SHA51224eff55499cfcfcad8ec8df6e7648b0f16cb2663b5f7d35d1a77caf8f5c5c08a4ad7eda6752113ecca448704e88d38035c43b77f48487954aae3d0ba607365bb
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
22KB
MD5b6cd131ff267b3e31fa46fd38bee362f
SHA18380dce825b965df3bceeaeb97289be2634badbd
SHA25689c98bd3c23e5911fde82a0c76eed820925d8a8e677f222355282c6efbe751dd
SHA5126ffaa12a85335a748a4fe7c51f1bc67baff07867774a1344f9b70c4fe3d5f51ccb46b5fd4b53b5bc79688c95ff818747077bc17f05a3c47226bdd0d8a3e4ca23
-
Filesize
2KB
MD5df8ef2a58a4eeaa49e80fe36dfbc1568
SHA15afd3745a3d581b10cc58ff92072cd9227c21a55
SHA256e84025a562b680b4357185d6c8a82b6ebcf95ed69ead002def3c3827bdbd5986
SHA5123389d353ed97d2b4c507002357b7f517dcaa1e663ab1997cb8ff1b20f1b81e0f10d32e1621a893fed28db2d393f683134140a58d48c8c9d1d36c3bc59910b0fe
-
Filesize
22KB
MD511f48c4d65582635e060a48a6d1fddc2
SHA15b0def8798a371b7baa9e39ea81c7a50ea3d5970
SHA256311b8c2f53eb6d423ca0244d814e5204f6b60f8791d6260e6b3f000ac29a5148
SHA512df9366c014cd44de4db4d5694564d9584500dbe4ddda73ed1dd27944f4e15e30396165de5f9c7b7ac0aa68f7d02f084957e3746ccdb7fdd3aeea920a28c0000b
-
Filesize
41KB
MD546da7319ab5b61b3f046dfe09d194758
SHA12b61a623513a88daf6e8931462363535360aa1e0
SHA2564b472941d130a20e608192c46a242c0956be20fd78726c25a3e1448ff62476c6
SHA512e25aa7258420b2e98891fcef02f05f5d48b358d51bc62be5fed1cbd3043a7ef3a2b17f581053190dd232fc9233465809ed23c128962f1f3e7765df0264b55eb6
-
Filesize
212KB
MD5a608397e9540389b46291383bfc31454
SHA1d8813ff94a09cd8cc2d5ab914c9a626327e50a61
SHA2568ef2a4561417b31972f693db6c9022974592e14755762911126efda43ff2dec3
SHA512242635ed925fdc062a3852afab389273ab79530b9758b6675e740a2d50efcaa18a35fb1be338957d871c7c01a1da2ca0a5984eb582a49aed811460f6ab1b9f35