Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows10-2004_x64 -
resource
win10v2004-20240704-en -
resource tags
arch:x64arch:x86image:win10v2004-20240704-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 05:55
Static task
static1
Behavioral task
behavioral1
Sample
879a5fbfb3b128fb50c7372d30a6e5b0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
879a5fbfb3b128fb50c7372d30a6e5b0N.exe
Resource
win10v2004-20240704-en
General
-
Target
879a5fbfb3b128fb50c7372d30a6e5b0N.exe
-
Size
205KB
-
MD5
879a5fbfb3b128fb50c7372d30a6e5b0
-
SHA1
8de3c3a7eb0825adcdbc94c0558d6eed9135b28b
-
SHA256
01a628b5bebe0ce0a83a5feaf728b6b2900836c83b77325520d45bc868587cee
-
SHA512
6ce5d1ec2a76bf2303000d4cfb76fd4b8f4d0345f53cc9f3b6f1458a886bea7e30444667678a677f449104cec6ce281d20e92baaf4ed948d3d1f88aa84d17985
-
SSDEEP
3072:J7VD4DUHnNZkfOP6sfIOpJ9C3hPlGxt1UhRkgyankTIzfwAYzWcXCyqT36zhRRKy:7zHnMLm5GNGxHUhtnkdpHqTKzhh8i
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4396 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\fa5d2b4b = "C:\\Windows\\apppatch\\svchost.exe" 879a5fbfb3b128fb50c7372d30a6e5b0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\fa5d2b4b = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 22 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 879a5fbfb3b128fb50c7372d30a6e5b0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 879a5fbfb3b128fb50c7372d30a6e5b0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 879a5fbfb3b128fb50c7372d30a6e5b0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4396 svchost.exe 4396 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2268 879a5fbfb3b128fb50c7372d30a6e5b0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2268 wrote to memory of 4396 2268 879a5fbfb3b128fb50c7372d30a6e5b0N.exe 84 PID 2268 wrote to memory of 4396 2268 879a5fbfb3b128fb50c7372d30a6e5b0N.exe 84 PID 2268 wrote to memory of 4396 2268 879a5fbfb3b128fb50c7372d30a6e5b0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\879a5fbfb3b128fb50c7372d30a6e5b0N.exe"C:\Users\Admin\AppData\Local\Temp\879a5fbfb3b128fb50c7372d30a6e5b0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4396
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
41KB
MD529b7e1d110749d075bdc214b0cdd71a9
SHA188c25824e65121535b0bd1fc525c0c9854f8e828
SHA256852a685f988d175c8df1f869e433191c2d7da93d290a5161e3e485260c6b43c5
SHA512364aef858d29becde62bd6d70c1f2e20d32dbe76abc34aa4810e8ca1945670a98e6b55deff94836f07bedc18168b26fc8e931e464bb53b2e20e3993d544349f5
-
Filesize
114B
MD5bfde1e9e9c32c1681a16139450c6909d
SHA17e669b927e6a75a10a0ca29e38e58ddcb49b725e
SHA256e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a
SHA512781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396
-
Filesize
114B
MD5e89f75f918dbdcee28604d4e09dd71d7
SHA1f9d9055e9878723a12063b47d4a1a5f58c3eb1e9
SHA2566dc9c7fc93bb488bb0520a6c780a8d3c0fb5486a4711aca49b4c53fac7393023
SHA5128df0ab2e3679b64a6174deff4259ae5680f88e3ae307e0ea2dfff88ec4ba14f3477c9fe3a5aa5da3a8e857601170a5108ed75f6d6975958ac7a314e4a336aed0
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
205KB
MD51285184ce44034da57798cf4e67a7acf
SHA148f3a3d3f478f9e5dcf00476cace6326ff913033
SHA256a22c4834f6df1bf8a9d23f0228b17a408c2b7e262d0ce229378a02bdb3a35e6e
SHA5123de3628472b61770d8461544b4621fc73043911f17f27b660dadb8b6158bccbad806275ecd37a6ecaa1f733d2c5f3cf958e1fceb8a86e490b60f21ea69ca21a7