Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
03/07/2024, 05:22
Static task
static1
Behavioral task
behavioral1
Sample
3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe
Resource
win10v2004-20240611-en
General
-
Target
3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe
-
Size
211KB
-
MD5
029dbff0eefc59729bf19ab501d94f70
-
SHA1
cf173a0581690e8773c2e8cf26c4f5399a0be958
-
SHA256
3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0
-
SHA512
411f5f02c0dfc09663646bc95e7202e020ce58d38af7103258bb64ed13d01b9b4400ac3e9222d2365d3ed96914eb59b4cb079e8cd31299a227c0b23c89b568e0
-
SSDEEP
6144:wrMoyX6dxajoPXA1nriwrw1cfCOSJcAb:GysxVY1nZ+b
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2912 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e0dc1815 = "C:\\Windows\\apppatch\\svchost.exe" 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe File opened for modification C:\Windows\apppatch\svchost.exe 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3691908287-3775019229-3534252667-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2912 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe Token: SeSecurityPrivilege 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe Token: SeSecurityPrivilege 2912 svchost.exe Token: SeSecurityPrivilege 2912 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1224 wrote to memory of 2912 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe 28 PID 1224 wrote to memory of 2912 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe 28 PID 1224 wrote to memory of 2912 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe 28 PID 1224 wrote to memory of 2912 1224 3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe"C:\Users\Admin\AppData\Local\Temp\3ee3e66acaee87bb8884a6fef92cf3082fa791bfbf750ba248de8235fa83d4b0.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2912
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
70KB
MD549aebf8cbd62d92ac215b2923fb1b9f5
SHA11723be06719828dda65ad804298d0431f6aff976
SHA256b33efcb95235b98b48508e019afa4b7655e80cf071defabd8b2123fc8b29307f
SHA512bf86116b015fb56709516d686e168e7c9c68365136231cc51d0b6542ae95323a71d2c7acec84aad7dcecc2e410843f6d82a0a6d51b9acfc721a9c84fdd877b5b
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize342B
MD52b66ae67d99a4b280b8dee8f86f65f10
SHA16a81a8d2c8baa23ccd41250b781c3833ca2b8bac
SHA25631dd00257040c0f1653fc5656b9ef5b48f7126ee9139a99374d40c3492c6a610
SHA5123803a22aec0d8a5d7169a752c937dc21dcfd379cc02b8e3cd34af5c5fcb84f0e3a44c9bb1cc87b67c01f07508f301d39505f932bdb2e02dabe211de839356b92
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD55b9a24ffc3b6ae0e0ebe2e514f1a2adc
SHA1a5f17d0a8d982bc7b730f599e0076f1363ec3484
SHA256b6d341f86414ce3aaa22d83ec75be320eb81c0255bdbad51dd223bf649ea92de
SHA512f8a828aacd68307a039ff48838536b1c0d3bd6d3060845edf839aae60231528e705f7889fe86f257d427ba05d67fb6f1652f7246e3ab0f28a36c623b40967e88
-
Filesize
68KB
MD529f65ba8e88c063813cc50a4ea544e93
SHA105a7040d5c127e68c25d81cc51271ffb8bef3568
SHA2561ed81fa8dfb6999a9fedc6e779138ffd99568992e22d300acd181a6d2c8de184
SHA512e29b2e92c496245bed3372578074407e8ef8882906ce10c35b3c8deebfefe01b5fd7f3030acaa693e175f4b7aca6cd7d8d10ae1c731b09c5fa19035e005de3aa
-
Filesize
181KB
MD54ea6026cf93ec6338144661bf1202cd1
SHA1a1dec9044f750ad887935a01430bf49322fbdcb7
SHA2568efbc21559ef8b1bcf526800d8070baad42474ce7198e26fa771dbb41a76b1d8
SHA5126c7e0980e39aacf4c3689802353f464a08cd17753bd210ee997e5f2a455deb4f287a9ef74d84579dbde49bc96213cd2b8b247723919c412ea980aa6e6bfe218b
-
Filesize
211KB
MD5bd2dedbbb99a53a172c4d6bfbaa7011a
SHA109a641da34155b45f34ecba87b6bfdfa7c05b4f6
SHA2561a9b8b0b488bf2a22c01400705f01bcfdb7536200f3e220c7553400103a04e5f
SHA5121f10bf1afd4eac6feec64d473023db1e951556c38ccc282fc0ea2f3a710f60ca67f3d74c9b971f12fac84e8223ec0ee443483b33597b9999ae0e2d6c36c1c1a2