Analysis
-
max time kernel
112s -
max time network
115s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
15/07/2024, 06:10
Static task
static1
Behavioral task
behavioral1
Sample
9804c27dfce4623fc81998eaeee83190N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
9804c27dfce4623fc81998eaeee83190N.exe
Resource
win10v2004-20240709-en
General
-
Target
9804c27dfce4623fc81998eaeee83190N.exe
-
Size
218KB
-
MD5
9804c27dfce4623fc81998eaeee83190
-
SHA1
90bd33709c12f9d47700fc22978c442d94232c63
-
SHA256
b3d37e0b0eb1590c0be8a86e15c9e57010bfdf91185ee48ef693656f3122e60f
-
SHA512
c15d53d8b4e85fed5b9c2d7a370bb0c152a8442c9d0a00a53b73ba510244e2c49ac79af6915f2559d7b3e2e6640193748c79afff1872f3764eb6902fbbe446cf
-
SSDEEP
3072:ovm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:m1SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4604 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1eb3222d = "›^˜\x1ba†zÐ_-\x7fÕ\x03A°7õ\x03Ž<º¥]Äï\x1b´\x01v\x7f\u00ad\x14©Ü\x1c\x10üà9ÑA,Æ\u008fH\x19xÉ©»\x18\u0081ƒÀdgƒ>DO^á$ÈÇC®4ào|[9Ñ™;xF\x03œ\\aDœf±¬»" 9804c27dfce4623fc81998eaeee83190N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1eb3222d = "›^˜\x1ba†zÐ_-\x7fÕ\x03A°7õ\x03Ž<º¥]Äï\x1b´\x01v\x7f\u00ad\x14©Ü\x1c\x10üà9ÑA,Æ\u008fH\x19xÉ©»\x18\u0081ƒÀdgƒ>DO^á$ÈÇC®4ào|[9Ñ™;xF\x03œ\\aDœf±¬»" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 9804c27dfce4623fc81998eaeee83190N.exe File opened for modification C:\Windows\apppatch\svchost.exe 9804c27dfce4623fc81998eaeee83190N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 3424 9804c27dfce4623fc81998eaeee83190N.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe 4604 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3424 9804c27dfce4623fc81998eaeee83190N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3424 wrote to memory of 4604 3424 9804c27dfce4623fc81998eaeee83190N.exe 86 PID 3424 wrote to memory of 4604 3424 9804c27dfce4623fc81998eaeee83190N.exe 86 PID 3424 wrote to memory of 4604 3424 9804c27dfce4623fc81998eaeee83190N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\9804c27dfce4623fc81998eaeee83190N.exe"C:\Users\Admin\AppData\Local\Temp\9804c27dfce4623fc81998eaeee83190N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3424 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:4604
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
41KB
MD5a8500e83c7e4e8012d208b76e4b08bb5
SHA1e8713ba3f79f3a90249b9a778e82fa41aa3bb6f8
SHA2560ed2b5bef974688df021aae3af2e7d0b920744ea6f77941b9729682e1377ea9a
SHA51218efb4be2ff43a7fd1b4d07ed25abcdf3248c4cf4e8c63ca6b42d44210362e9166bc8def4ca319d9c035438fae3853cbfb4134abd06db96bb9b57d5c403e5ee9
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
218KB
MD5de091955c2561c169d66da59729e7320
SHA1115682519f40a04d527e50cb987665bbe578419e
SHA256f4b81c45e4f2a8d62ad426f48d086ffdcbe5d8593f4440c4d849949498be539d
SHA512dca5adc2c8a4b6be756ec34e21d38bf28be11755df950a8bc75dc5328710e2ab31fa99e5784e7a12c4961072c78d82ff9e363bbd24eab02fea5a22f2fbe01e8e