Analysis
-
max time kernel
120s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
24/07/2024, 03:05
Static task
static1
Behavioral task
behavioral1
Sample
3f6f68f74ccae8afd0de6996f58978f0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
3f6f68f74ccae8afd0de6996f58978f0N.exe
Resource
win10v2004-20240709-en
General
-
Target
3f6f68f74ccae8afd0de6996f58978f0N.exe
-
Size
212KB
-
MD5
3f6f68f74ccae8afd0de6996f58978f0
-
SHA1
073ecf54d85162d3b25c175cfcc874d6bc29590e
-
SHA256
82cdb515346c46bd672afea4f52d936a1886818477d5f0bf4bc6056067d51eb5
-
SHA512
55dc89aee1192f193b8fa56114aae5a3c645f32e50be2b58b1840c9549bfe220515372b05f311e2f63b1467bff97edaf9df14cb677ac3dedf388cb77d11139c7
-
SSDEEP
3072:mGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:mG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2324 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\eaef7b8c = "DW¹[nqt|\x10èÛÇS†ebˆ\x17\u008da\x16µŽ7Òx«‘ mb¯ímå¥v\x0f;½Ã¦\a\x15Û\x18¨\u00ad}÷¤tt÷,/´Ó§´\u00adµ\b‡ýC\x15\u008d\a5\\g³³U\x0e F×Ó¬îõ\x1d0\x17‡µHÔ,ý¥XÿÌO/Pc/\u00ad7\u009d+cs@ä$&¦\x10ŸL\x14?ÇÅeËý—äoÍ´¥P$¼Ç.7}í\x1c¾%¼ß•\x13‹€o=?\x18÷6ïÿ-&v7«G\x7fU¦\u008dÖ\x7fÿh§ÇÕx´å{5Ÿ\u009dW¯Ž~%àMo^ï\x15wÇ—Ý[\x0fÖ%G`-ýuŸ\x17¬C$‹ÍSÐ\x7f”ãýð—€ÿ3¥ŸœHVWï·G\x1d-u\x0eÇ[Ý,…t½Uý]—Ž¶x@F\x05U\x1eƒ–em\x15¨o°˜" 3f6f68f74ccae8afd0de6996f58978f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\eaef7b8c = "DW¹[nqt|\x10èÛÇS†ebˆ\x17\u008da\x16µŽ7Òx«‘ mb¯ímå¥v\x0f;½Ã¦\a\x15Û\x18¨\u00ad}÷¤tt÷,/´Ó§´\u00adµ\b‡ýC\x15\u008d\a5\\g³³U\x0e F×Ó¬îõ\x1d0\x17‡µHÔ,ý¥XÿÌO/Pc/\u00ad7\u009d+cs@ä$&¦\x10ŸL\x14?ÇÅeËý—äoÍ´¥P$¼Ç.7}í\x1c¾%¼ß•\x13‹€o=?\x18÷6ïÿ-&v7«G\x7fU¦\u008dÖ\x7fÿh§ÇÕx´å{5Ÿ\u009dW¯Ž~%àMo^ï\x15wÇ—Ý[\x0fÖ%G`-ýuŸ\x17¬C$‹ÍSÐ\x7f”ãýð—€ÿ3¥ŸœHVWï·G\x1d-u\x0eÇ[Ý,…t½Uý]—Ž¶x@F\x05U\x1eƒ–em\x15¨o°˜" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3f6f68f74ccae8afd0de6996f58978f0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 3f6f68f74ccae8afd0de6996f58978f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3f6f68f74ccae8afd0de6996f58978f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe 2324 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2996 wrote to memory of 2324 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 30 PID 2996 wrote to memory of 2324 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 30 PID 2996 wrote to memory of 2324 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 30 PID 2996 wrote to memory of 2324 2996 3f6f68f74ccae8afd0de6996f58978f0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3f6f68f74ccae8afd0de6996f58978f0N.exe"C:\Users\Admin\AppData\Local\Temp\3f6f68f74ccae8afd0de6996f58978f0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2324
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\HTBGGANG\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
23KB
MD564578cc00e0702cd0aacfdcebe613e19
SHA1e32131fc2f0ad8f386a3ace5fad2691055569314
SHA25635b3495b485405ae284f83f6a965675b9d140cca18e848e921df97b1d81b509f
SHA512c5bd6d577a54b6b1cc1cec793b3eb44d6cbabac4b82f93068094be6886c307b1e4a0d0eb69eca28bdd4cd42b103c485e36613c83ae50d43c0644a808ae0836d1
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
212KB
MD5444567efb5e940ef19a061118344826d
SHA18378bf5adcdb5c1e03a373a708c2ba49c3042dd8
SHA256cd10482f76c040481c705e6b8fa56a8bae065ec57008939651dac5976bf27b25
SHA512ccf92b64b302ec6e2be6f05fef88120b524118bef84451115bd8b56e33563e0f808ee8f421e1a1ca1a6af1753cdcca990e87d0aabba71c19566d7b971251c8d6