Analysis
-
max time kernel
119s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21-07-2024 15:18
Static task
static1
Behavioral task
behavioral1
Sample
de089ad73233c994b4b6cf58d81e4ae0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
de089ad73233c994b4b6cf58d81e4ae0N.exe
Resource
win10v2004-20240709-en
General
-
Target
de089ad73233c994b4b6cf58d81e4ae0N.exe
-
Size
355KB
-
MD5
de089ad73233c994b4b6cf58d81e4ae0
-
SHA1
cf9ba994818c9cba0d0b049fb499114f9c21d06b
-
SHA256
151ad95544425eab1e2de56b314e732090b48faeb3cfb5ae7b8ebd2660aedfda
-
SHA512
778351179598194b2a89e4c8e46b5c1814f19a52f770ac2f21adc5abbb6b4d9a27ad7d2e1784c03fa04bae9e2d189492b77ebd5592de1697e0f2c35bcfea618b
-
SSDEEP
6144:q3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:1mWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2180 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1930c2a7 = ";‚]P\x18¦M.'l\x1fžo)Ø8\x14ÒÏ4d\u008d”áDckN„8¼yhû0IW0Ù˜YØ\u00a0øpw‡y\x13q?+yÿh'£y)ßQp'oÉq×ɘ\u0090\bHH" de089ad73233c994b4b6cf58d81e4ae0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1930c2a7 = ";‚]P\x18¦M.'l\x1fžo)Ø8\x14ÒÏ4d\u008d”áDckN„8¼yhû0IW0Ù˜YØ\u00a0øpw‡y\x13q?+yÿh'£y)ßQp'oÉq×ɘ\u0090\bHH" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe de089ad73233c994b4b6cf58d81e4ae0N.exe File opened for modification C:\Windows\apppatch\svchost.exe de089ad73233c994b4b6cf58d81e4ae0N.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe 2180 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2180 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 30 PID 1940 wrote to memory of 2180 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 30 PID 1940 wrote to memory of 2180 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 30 PID 1940 wrote to memory of 2180 1940 de089ad73233c994b4b6cf58d81e4ae0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\de089ad73233c994b4b6cf58d81e4ae0N.exe"C:\Users\Admin\AppData\Local\Temp\de089ad73233c994b4b6cf58d81e4ae0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Suspicious behavior: EnumeratesProcesses
PID:2180
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481B
MD534106211a6d4a1e9a4064f26b09f65e0
SHA1922b1e8ebe6b71303ef37b8e89a3fdc16f79bca6
SHA25648b59ab0df21888c0aaf1360617914aece727ec38f361f9dbe1f7c3aadc67f74
SHA51244154e0d47e75c16bfa63467f9d860e1397240efc74612cb98d436302e2a00e51bc553100dc4d36a3e212795687e8de70d04aa1c2230cd2beb478229c7747cc4
-
Filesize
355KB
MD57bc5317022a2ff994a7ae952f23ad7ec
SHA1d642834ace8571897f0486f912dc89b20a0c69bd
SHA256903aa6203162fe95ce3f152de719f4f696ce24de21e5768248fed8929d732072
SHA512a373dca2203043dd381756a662f4ed35ea347447165f0e0c6bbda1729eb29cb7889bdf5fb92c7746c490438afb5f7b6d38b38379952330a76288d6656ab64f5a