Analysis
-
max time kernel
103s -
max time network
104s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
24/07/2024, 02:05
Static task
static1
Behavioral task
behavioral1
Sample
37803ea7055ac72b1d89f95a61407b00N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
37803ea7055ac72b1d89f95a61407b00N.exe
Resource
win10v2004-20240704-en
General
-
Target
37803ea7055ac72b1d89f95a61407b00N.exe
-
Size
63KB
-
MD5
37803ea7055ac72b1d89f95a61407b00
-
SHA1
be4c61a1394437bc523815b3ef9186d9b72f4f1d
-
SHA256
9f216a073f8083a2525597ade8f3da6f3a629e567f8f88483d1990d22b237b99
-
SHA512
bf927392d9517ca14bc3c5165201853f0df5c4d65abbd1c55bc22e8e15a0414ffdfbd1c01cff47d92b274f38d4c395a61a8b39ef4984c35b787b44c30158a203
-
SSDEEP
384:5EueqcNOpLsz3YN6RTqjTPJOGjMuPr8JMD+jQLv5OzeXy:SueqsOpLszoFvwUQJCy25eeXy
Malware Config
Signatures
-
Event Triggered Execution: AppInit DLLs 1 TTPs
Adversaries may establish persistence and/or elevate privileges by executing malicious content triggered by AppInit DLLs loaded into processes.
-
Deletes itself 1 IoCs
pid Process 2340 ice20060825.bak -
Executes dropped EXE 1 IoCs
pid Process 2340 ice20060825.bak -
Modifies WinLogon 2 TTPs 7 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinIce\Shutdown = "Gs2Shutdown" ice20060825.bak Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinIce\Startup = "Gs2Startup" ice20060825.bak Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinIce\Asynchronous = "1" ice20060825.bak Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinIce\Impersonate = "0" ice20060825.bak Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinIce ice20060825.bak Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify ice20060825.bak Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Notify\WinIce\DllName = "C:\\Windows\\system32\\winice.dll" ice20060825.bak -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 37803ea7055ac72b1d89f95a61407b00N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ice20060825.bak -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2340 ice20060825.bak 2340 ice20060825.bak -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2340 ice20060825.bak -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1520 wrote to memory of 2340 1520 37803ea7055ac72b1d89f95a61407b00N.exe 85 PID 1520 wrote to memory of 2340 1520 37803ea7055ac72b1d89f95a61407b00N.exe 85 PID 1520 wrote to memory of 2340 1520 37803ea7055ac72b1d89f95a61407b00N.exe 85 PID 2340 wrote to memory of 616 2340 ice20060825.bak 5
Processes
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:616
-
C:\Users\Admin\AppData\Local\Temp\37803ea7055ac72b1d89f95a61407b00N.exe"C:\Users\Admin\AppData\Local\Temp\37803ea7055ac72b1d89f95a61407b00N.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\ice20060825.bak"C:\Users\Admin\AppData\Local\Temp\ice20060825.bak" *C:\Users\Admin\AppData\Local\Temp\37803ea7055ac72b1d89f95a61407b00N.exe2⤵
- Deletes itself
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
63KB
MD537803ea7055ac72b1d89f95a61407b00
SHA1be4c61a1394437bc523815b3ef9186d9b72f4f1d
SHA2569f216a073f8083a2525597ade8f3da6f3a629e567f8f88483d1990d22b237b99
SHA512bf927392d9517ca14bc3c5165201853f0df5c4d65abbd1c55bc22e8e15a0414ffdfbd1c01cff47d92b274f38d4c395a61a8b39ef4984c35b787b44c30158a203