Analysis
-
max time kernel
141s -
max time network
128s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
06/07/2024, 21:36
Static task
static1
Behavioral task
behavioral1
Sample
4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe
Resource
win10v2004-20240704-en
General
-
Target
4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe
-
Size
244KB
-
MD5
7d434879979c5529a7b7a6a75c6400ed
-
SHA1
ed7bbc47344172a2e77c51c34370d6bcadeccd29
-
SHA256
4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11
-
SHA512
dae4a04b8b75d68faeca0ae0c6afa50c8ee97c09a1001073b105f2cb1ad5ad32e8fbc3488817d9024b52bf826f033bc709043d88a7b96b896903d25aa01226ef
-
SSDEEP
6144:eEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:TAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2392 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe 2564 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\542bdc6f = "C:\\Windows\\apppatch\\svchost.exe" 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\542bdc6f = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe File opened for modification C:\Windows\apppatch\svchost.exe 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2564 2392 WerFault.exe 30 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2392 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2764 wrote to memory of 2392 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe 30 PID 2764 wrote to memory of 2392 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe 30 PID 2764 wrote to memory of 2392 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe 30 PID 2764 wrote to memory of 2392 2764 4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe 30 PID 2392 wrote to memory of 2564 2392 svchost.exe 31 PID 2392 wrote to memory of 2564 2392 svchost.exe 31 PID 2392 wrote to memory of 2564 2392 svchost.exe 31 PID 2392 wrote to memory of 2564 2392 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe"C:\Users\Admin\AppData\Local\Temp\4f5c352ece7e5c178814d6ba51a78dee093a8b77393286047a67530f942bdf11.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 3683⤵
- Loads dropped DLL
- Program crash
PID:2564
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD58c171dc65e40200d7d895b7f895d4c6c
SHA1026ac96a679fa6c8033ab463588ddbef37c7bfec
SHA25622526a397eec51ae2618dfad9be1731d3375dd6c3c1a6b533ccc4df1dcc0fb6a
SHA5127794cb8cdcd261a855585c739fca7d91b65eb0c5bb61db5d52847fc1327f6745b45b8967623c7d722a8b9cfd70a94a5da8cc64f76c2264f8d28f10ed5080fc47