Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
06-07-2024 22:22
Static task
static1
Behavioral task
behavioral1
Sample
1ce476f82cee74231401b37a99650d40N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
1ce476f82cee74231401b37a99650d40N.exe
Resource
win10v2004-20240704-en
General
-
Target
1ce476f82cee74231401b37a99650d40N.exe
-
Size
211KB
-
MD5
1ce476f82cee74231401b37a99650d40
-
SHA1
1208512288024ca2661eecd11f83ad171eca1588
-
SHA256
a5666de35d8333c1a91281efffa6eab92820850336566bb3de258ce9814d3891
-
SHA512
0b770f9e5e05fb9ee47cd7dada684736c8c074a2b55f64a1f174db11082e1370a94fa63f884c7aaa83537c100c01e0a901ac5ed635e54dcbca7e46b1ecd92470
-
SSDEEP
6144:gmKVGe1XIpQiU/ma3MB8hH2Tkp6bYnWcZVol0N5TzQ3:q71YpQiU/RcO1VQInVob
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4996 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f011599b = "C:\\Windows\\apppatch\\svchost.exe" 1ce476f82cee74231401b37a99650d40N.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\winsta.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\DLL\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wrpcrt4.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernel32.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\winsta.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wntdll.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\wkernelbase.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\dll\wrpcrt4.pdb svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\WinSCard.pdb svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\symbols\dll\wntdll.pdb svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 1ce476f82cee74231401b37a99650d40N.exe File opened for modification C:\Windows\apppatch\svchost.exe 1ce476f82cee74231401b37a99650d40N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe 4996 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4016 1ce476f82cee74231401b37a99650d40N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4016 1ce476f82cee74231401b37a99650d40N.exe Token: SeSecurityPrivilege 4016 1ce476f82cee74231401b37a99650d40N.exe Token: SeSecurityPrivilege 4996 svchost.exe Token: SeSecurityPrivilege 4996 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4016 wrote to memory of 4996 4016 1ce476f82cee74231401b37a99650d40N.exe 87 PID 4016 wrote to memory of 4996 4016 1ce476f82cee74231401b37a99650d40N.exe 87 PID 4016 wrote to memory of 4996 4016 1ce476f82cee74231401b37a99650d40N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\1ce476f82cee74231401b37a99650d40N.exe"C:\Users\Admin\AppData\Local\Temp\1ce476f82cee74231401b37a99650d40N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4016 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4996
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
211KB
MD534a9cfea186d9052c13db9f60479da9c
SHA1960afc3927306e7b6f1be6d2e4cdd4516de6660c
SHA2565d09f89095cc8e6d9d9a69465e9cf044b26173a1a07ccaaa573a4d6dd3d6fcf3
SHA5122af6cadbb2402bd9e352b7ce2864e0df07a4f987ac6ef2fd0e0a38c5d68129d76ad67b402aa1f4fbe9cad91006566d39f05f5b1c9c163bcb6aa69cbf9547a9e3