Analysis
-
max time kernel
150s -
max time network
140s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
28/05/2024, 20:24
Static task
static1
Behavioral task
behavioral1
Sample
370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe
Resource
win10v2004-20240508-en
General
-
Target
370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe
-
Size
217KB
-
MD5
a0856e80d531ea72928903a6334bdadb
-
SHA1
a50b378d9bbc8db6af06ed524f4dd0628c996fe3
-
SHA256
370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b
-
SHA512
6f334c9aa912abd8ad52887e380c67f9ae602cf3f1396c06fcec1588f0cdcae7486309d496d3743fd85d9dd39e9ef6ba43e287322ef6916207d06043b273358d
-
SSDEEP
6144:4nyiqVQBf0EaIp8fkTJJsK1eEzEB1XjrkXb:BEdp8csKpE7XX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2496 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a36821f3 = "C:\\Windows\\apppatch\\svchost.exe" 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe -
Drops file in Program Files directory 17 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qegyval.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe File opened for modification C:\Windows\apppatch\svchost.exe 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2804150937-2146708401-419095071-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe 2496 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3440 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 3440 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe Token: SeSecurityPrivilege 3440 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe Token: SeSecurityPrivilege 2496 svchost.exe Token: SeSecurityPrivilege 2496 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3440 wrote to memory of 2496 3440 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe 84 PID 3440 wrote to memory of 2496 3440 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe 84 PID 3440 wrote to memory of 2496 3440 370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe"C:\Users\Admin\AppData\Local\Temp\370713b1ddcb8e514a9a27a14a8272d791483faeb8d1923f66b1a22d68344c0b.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3440 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
217KB
MD5964893acaf60610057f6accb66f98846
SHA1cfab118b4e1cc6296c12d404eb00042ca1932127
SHA256b8b3cd119e987690d8bbc2d16ad2237cf778adda537e0d8a6adc38cbb8535e85
SHA512339c81663b3dc129e4dbc33c87baf9e336ce196cec0ed8a553c99488b207745534d4c9c4d8da6f4b9651da7769aec84d64f926a97f9adc6879482f4640f9325b