Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
23/07/2024, 04:01
Static task
static1
Behavioral task
behavioral1
Sample
60d4510750133c5c518738d5e58828f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
60d4510750133c5c518738d5e58828f0N.exe
Resource
win10v2004-20240704-en
General
-
Target
60d4510750133c5c518738d5e58828f0N.exe
-
Size
209KB
-
MD5
60d4510750133c5c518738d5e58828f0
-
SHA1
b4080c699c73d1b0ced255792193b747b1bf6fcd
-
SHA256
7ca17221f4b6f5e4ee0015b08fb0a47ff01dd45a5cbfbb27473b0876765764fd
-
SHA512
05b7e4b160e290c330365f065ac31c95b2f4b28e7b1c06df97a1cb556f6b3bc8a387dc2ef22b968c6b2c23f690b1a9723541f309cdb90c0572c7b13efd96edab
-
SSDEEP
3072:BEdOQzZnx6OJPa0UVKS1DNB4jQVckmFP5GTBiRw0OZ9pB05OZalrl7Sy+uwY4d:+zZnx68OKSOjQ7m+TUWzpm5aSxTXw
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1496 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\31734012 = "C:\\Windows\\apppatch\\svchost.exe" 60d4510750133c5c518738d5e58828f0N.exe -
Drops file in Program Files directory 18 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 60d4510750133c5c518738d5e58828f0N.exe File created C:\Windows\apppatch\svchost.exe 60d4510750133c5c518738d5e58828f0N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1403246978-718555486-3105247137-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe 1496 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1120 60d4510750133c5c518738d5e58828f0N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1120 60d4510750133c5c518738d5e58828f0N.exe Token: SeSecurityPrivilege 1120 60d4510750133c5c518738d5e58828f0N.exe Token: SeSecurityPrivilege 1496 svchost.exe Token: SeSecurityPrivilege 1496 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1120 wrote to memory of 1496 1120 60d4510750133c5c518738d5e58828f0N.exe 86 PID 1120 wrote to memory of 1496 1120 60d4510750133c5c518738d5e58828f0N.exe 86 PID 1120 wrote to memory of 1496 1120 60d4510750133c5c518738d5e58828f0N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\60d4510750133c5c518738d5e58828f0N.exe"C:\Users\Admin\AppData\Local\Temp\60d4510750133c5c518738d5e58828f0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1496
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
209KB
MD5d1746b26e276d477b30e30464be04438
SHA1eee3b7e7c8b5c185f6465bab008b5b5e357c2a22
SHA256f74a1fca1ede1cf8b27bb4c0f7013345fcb28caa622e78755115ef63293511e2
SHA512f4789338ce2837731b91b8efc672dc05b2f6636c449379a6a6e678002f908fecbb9adf2d4dcee7f523ab79f745c0b6e5e89c5aa75f484e09a8d5eb86ef2a7c88