Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
24-05-2024 03:10
Static task
static1
Behavioral task
behavioral1
Sample
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe
Resource
win10v2004-20240426-en
General
-
Target
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe
-
Size
218KB
-
MD5
23b2542d678766df2cca1e7c6a6485dc
-
SHA1
1dfc34f9969e2f6fa63dff05e96db737bdf87568
-
SHA256
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d
-
SHA512
6dfb946ee1e3ab3f0852ab679d8651fd78698f354a282c62d7924d97795732c16a6d059eb444d9acb850ecdb180d197c95b74a7077fc761a412ac61ba8641f02
-
SSDEEP
3072:Dvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:71SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2076 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exepid process 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe -
Modifies WinLogon 2 TTPs 2 IoCs
Processes:
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exesvchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4e1d74cf = "’)o¶ÚÏ-û\x13è\b\x18ƒ½û\u00a0•" c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4e1d74cf = "’)o¶ÚÏ-û\x13è\b\x18ƒ½û\u00a0•" svchost.exe -
Drops file in Windows directory 2 IoCs
Processes:
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exedescription ioc process File created C:\Windows\apppatch\svchost.exe c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe File opened for modification C:\Windows\apppatch\svchost.exe c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe -
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 040000000100000010000000410352dc0ff7501b16f0028eba6f45c50f00000001000000140000005bcaa1c2780f0bcb5a90770451d96f38963f012d0b000000010000001e000000440053005400200052006f006f0074002000430041002000580033000000090000000100000016000000301406082b0601050507030406082b06010505070301140000000100000014000000c4a7b1a47b2c71fadbe14b9075ffc415608589101d00000001000000100000004558d512eecb27464920897de7b66053030000000100000014000000dac9024f54d8f6df94935fb1732638ca6ad77c131900000001000000100000006cf252fec3e8f20996de5d4dd9aef42420000000010000004e0300003082034a30820232a003020102021044afb080d6a327ba893039862ef8406b300d06092a864886f70d0101050500303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f74204341205833301e170d3030303933303231313231395a170d3231303933303134303131355a303f31243022060355040a131b4469676974616c205369676e617475726520547275737420436f2e311730150603550403130e44535420526f6f7420434120583330820122300d06092a864886f70d01010105000382010f003082010a0282010100dfafe99750088357b4cc6265f69082ecc7d32c6b30ca5becd9c37dc740c118148be0e83376492ae33f214993ac4e0eaf3e48cb65eefcd3210f65d22ad9328f8ce5f777b0127bb595c089a3a9baed732e7a0c063283a27e8a1430cd11a0e12a38b9790a31fd50bd8065dfb7516383c8e28861ea4b6181ec526bb9a2e24b1a289f48a39e0cda098e3e172e1edd20df5bc62a8aab2ebd70adc50b1a25907472c57b6aab34d63089ffe568137b540bc8d6aeec5a9c921e3d64b38cc6dfbfc94170ec1672d526ec38553943d0fcfd185c40f197ebd59a9b8d1dbada25b9c6d8dfc115023aabda6ef13e2ef55c089c3cd68369e4109b192ab62957e3e53d9b9ff0025d0203010001a3423040300f0603551d130101ff040530030101ff300e0603551d0f0101ff040403020106301d0603551d0e04160414c4a7b1a47b2c71fadbe14b9075ffc41560858910300d06092a864886f70d01010505000382010100a31a2c9b17005ca91eee2866373abf83c73f4bc309a095205de3d95944d23e0d3ebd8a4ba0741fce10829c741a1d7e981addcb134bb32044e491e9ccfc7da5db6ae5fee6fde04eddb7003ab57049aff2e5eb02f1d1028b19cb943a5e48c4181e58195f1e025af00cf1b1ada9dc59868b6ee991f586cafab96633aa595bcee2a7167347cb2bcc99b03748cfe3564bf5cf0f0c723287c6f044bb53726d43f526489a5267b758abfe67767178db0da256141339243185a2a8025a3047e1dd5007bc02099000eb6463609b16bc88c912e6d27d918bf93d328d65b4e97cb15776eac5b62839bf15651cc8f677966a0a8d770bd8910b048e07db29b60aee9d82353510 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exesvchost.exepid process 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe 2076 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exepid process 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exedescription pid process target process PID 2804 wrote to memory of 2076 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe svchost.exe PID 2804 wrote to memory of 2076 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe svchost.exe PID 2804 wrote to memory of 2076 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe svchost.exe PID 2804 wrote to memory of 2076 2804 c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe"C:\Users\Admin\AppData\Local\Temp\c7a364c1d4cb1f8e1f220ee66a372a5d2132c7e31bfb22c466901845e79aa81d.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:2076
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD519d3c081778eae783070f37d01fcf313
SHA1379b8bffba8a65b4ea30cb289761a4a75df27c1f
SHA256d290f6aa2551e9490c644949b933f335409f3b0b1b1faedf2776645ee308cdae
SHA512e85511d9554f08ccc25b0abfc7928df7b5ccc5f0d588716a463b234a72585fb8aa86e70e85ddf92530bd9998f06c3e9042a397a677b865a5158c5ef9bca42d1a
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5d3aa17faf16978e3574e299cd515a470
SHA16dc5b00d3ef110cb6494da35c813228bbd24f79d
SHA256a9963743245db1252eb17a83fdf02f062185666b604bfdbf403622ea61d9108e
SHA512bbd4067fb8765dacc5e78a8fb4a49fad08fd409652e48bcd4da20e2cdf9a50f67518a68ddc6ebe5121e9348fdb3b2239a364e62e6e0d493172984e79e72408ee
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD51c2ac22a23f4467f8c16e96ce1283d0c
SHA1469dc979746089db0b6e15fa9a2d51e7bcceccf2
SHA25671e14f77aac3c80265b8e50a2fcb6e5590836f0f5cf91c63b972f90c35f0b1fa
SHA51224a222bb5e282c23561b3f6c4c1908bdd9eed802a97fcb115611f9ab916b39425b76ef130bd6cf8c627c7a347013f008c64af77122cf5e072ee96113677bc8c1
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\9M0HR0P6\login[2].htm
Filesize593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\L9PN2QMY\login[2].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
457B
MD5531ec87a0b2f9477a52d88b111d0d46a
SHA150a72e5752075309f91c062e0282a7e7cd1e751e
SHA2564875b451859b1eb8d0d3b040b1bb8d654d212edb6d9c721cf0f4372129579385
SHA51207994963fd76b31ef0ba2c7f418dcb3ee0290f6baca2d8ec63a6e6b861557b13fbc20d2f0a10a66f35c4d72d4d2c1920ac88b96174604f2f8856868912327da1
-
Filesize
481B
MD57ad33b02542eec9646447ac09953f4bc
SHA18a9e9bb32991494e71663cb1b9a0f73cd49bd754
SHA256247ef8ff9d9c068dd04edfdd7f832cd864a7ab5a4af70c797c54f8360b76da71
SHA512897cd5c619e4d487884ecfe30399cc2520c8e990a358db2dfea8d0f10277187e94c27e1d7c149c350be86f9591baca90a3df9d29b298e769d7d82c69eb44ba97
-
Filesize
42KB
MD5429a5f0a169a788b83def3c629750408
SHA1a0ecef0053bc4cfe90adf0f1b2b6361a1977a8ae
SHA2564479bfdf07f7483e608caa5fcc6118fe70d4482c899300d47ab1d10c9748cad7
SHA512f28aa1cb2c8131ea022db2c1803444de02a73940def1788646e3587e7ba8342ca201bbb1ceec1c96a97e81efa59753ac1555b47163596b3c63e65183b83fc5aa
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
177KB
MD5435a9ac180383f9fa094131b173a2f7b
SHA176944ea657a9db94f9a4bef38f88c46ed4166983
SHA25667dc37ed50b8e63272b49a254a6039ee225974f1d767bb83eb1fd80e759a7c34
SHA5121a6b277611959720a9c71114957620517ad94541302f164eb872bd322292a952409bafb8bc2ac793b16ad5f25d83f8594ccff2b7834e3c2b2b941e6fc84c009a
-
Filesize
218KB
MD51bc16d5ecc55b71aa953f52b139d717a
SHA11c1b7c79a9e5b7650ba94b486c52b3ce0821bf3c
SHA256a8d232e75f5d977dc2a3ae0d8020b1b2d641b38c30dd895cac59c7d0e10c309d
SHA51225b38b31235cc8405e0c4d70a715ac7ff4b44560d7a649f15b35296af0c718d511d95d1eb779040582de581882e3e19786b98557c9cc47c5a3832dcd840b9f7b