Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240426-en -
resource tags
arch:x64arch:x86image:win10v2004-20240426-enlocale:en-usos:windows10-2004-x64system -
submitted
22-05-2024 03:17
Static task
static1
Behavioral task
behavioral1
Sample
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe
Resource
win10v2004-20240426-en
General
-
Target
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe
-
Size
215KB
-
MD5
60c4d3f1b35d26f8af0fe44652ef5a13
-
SHA1
02beeb351e22b92b2b3f19c6854eea559bc0f0d8
-
SHA256
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7
-
SHA512
b0cc9fc4c62e4fa520084da617eeda06637c729de54ad7950c2724fc2c27b8348fb19290be086e6860b2a83941889b71bdf626dfc52eaa2a1d356491d7a490a1
-
SSDEEP
6144:iJcxlKhSGoqTecGy9+hAu7//QnSrMhcZEp:iS8hbTiyqA4QnSQhcZ8
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1328 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
Processes:
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9bc89909 = "C:\\Windows\\apppatch\\svchost.exe" 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe -
Drops file in Program Files directory 36 IoCs
Processes:
svchost.exedescription ioc process File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exedescription ioc process File opened for modification C:\Windows\apppatch\svchost.exe 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe File created C:\Windows\apppatch\svchost.exe 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe -
Modifies registry class 1 IoCs
Processes:
svchost.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-540404634-651139247-2967210625-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
svchost.exepid process 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe 1328 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exepid process 1940 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
Processes:
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exesvchost.exedescription pid process Token: SeSecurityPrivilege 1940 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe Token: SeSecurityPrivilege 1940 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe Token: SeSecurityPrivilege 1328 svchost.exe Token: SeSecurityPrivilege 1328 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exedescription pid process target process PID 1940 wrote to memory of 1328 1940 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe svchost.exe PID 1940 wrote to memory of 1328 1940 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe svchost.exe PID 1940 wrote to memory of 1328 1940 93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe"C:\Users\Admin\AppData\Local\Temp\93048cf500f152c527cfbfcee489e41a74c54966286f81d40d4fa4b8317b4af7.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1328
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
215KB
MD54e68acf04ab12de0970befcd87e1fe22
SHA15b1e19d1b96077a834a7c658c01a90a0599a68b0
SHA2567ef761efc5e84b3f2a461487c25c8bbcc1af9d4ac5d4be0753fb6bee0b4c7eba
SHA512d6de816e6fbb5722fad34b8136b911c1b4a375475cf24b7d005f21593dc4446a8aa5a3d5a9b49e069f4dfb2eec399ce2d2b3da4dca72191fae57fc1fdd03ba28