Analysis
-
max time kernel
120s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
19/07/2024, 01:15
Static task
static1
Behavioral task
behavioral1
Sample
351650ddc6c955b5360582f26bc8aad0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
351650ddc6c955b5360582f26bc8aad0N.exe
Resource
win10v2004-20240709-en
General
-
Target
351650ddc6c955b5360582f26bc8aad0N.exe
-
Size
338KB
-
MD5
351650ddc6c955b5360582f26bc8aad0
-
SHA1
162e801b30f9a4253152ec92863280cbc70998c7
-
SHA256
6e77add00f2bbb3062fbb7580a631a4d7930adc313c972942dab08edb478969c
-
SHA512
e8e58403c1d78e7f1e8632946056b9a12f2c73d6981f71275dde6e6ea3b2278b4098ac4b4d152ddb93dd9fa176a32247be66926e183751d8b8fccc3266d085c6
-
SSDEEP
6144:MExz45lS77IQi8Dq+9fXphN2LfjEcYzaWqr57Q7Xwxc4SQjWvvf:mlS71Dq+pcYWWqtfxvSQj2f
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 932 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\44508738 = "C:\\Windows\\apppatch\\svchost.exe" 351650ddc6c955b5360582f26bc8aad0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\44508738 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 351650ddc6c955b5360582f26bc8aad0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 351650ddc6c955b5360582f26bc8aad0N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 932 svchost.exe 932 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2808 351650ddc6c955b5360582f26bc8aad0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2808 wrote to memory of 932 2808 351650ddc6c955b5360582f26bc8aad0N.exe 84 PID 2808 wrote to memory of 932 2808 351650ddc6c955b5360582f26bc8aad0N.exe 84 PID 2808 wrote to memory of 932 2808 351650ddc6c955b5360582f26bc8aad0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\351650ddc6c955b5360582f26bc8aad0N.exe"C:\Users\Admin\AppData\Local\Temp\351650ddc6c955b5360582f26bc8aad0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:932
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
338KB
MD50b131aec805d9b763941a24ea05dc419
SHA14f9bd2b3443c07ab52c0f753414d6df4f583cccd
SHA2568e2cc717512fb91313a6dac9dddc4e06186edb8b3dab7d8e81e2262488c55ad2
SHA5128ae8718d9f8f5394437d7fc242d13f3f654d442484e09781790dfc6cdcbf747682e94702684eb09ad1fe5e82ac7f864de8bba3f7a5fc3d0b285c608519125857