Analysis
-
max time kernel
119s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
26/07/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
8c41ceaf5e828aafda42cc07e0bb27c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c41ceaf5e828aafda42cc07e0bb27c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
8c41ceaf5e828aafda42cc07e0bb27c0N.exe
-
Size
218KB
-
MD5
8c41ceaf5e828aafda42cc07e0bb27c0
-
SHA1
7cdb5338dd6615c9d96defe80b2ed6b89ac960a1
-
SHA256
782f5c782938193d1a4a109fd78ea329a37236b27ffbfce0042c976238dc9c3b
-
SHA512
1b903715db324edc701faba47135385243e792c220badfce8fb93df9f2d02be045408783ed6236aac2e8bd911f8d5d7d53c3982b80a92d3c200826cb5699e202
-
SSDEEP
3072:Evm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:S1SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2344 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ca74fae1 = "\x14rÜ›\x01¨PTÝY¶ëÞ½Ã}i(-rÙ\x11¹›²d\u0081ÂñÈ2h4§ÒÛ¦½hÍ×ÊÔ\x1b7¸Vó‡å.Ø?;\býî'¸\rÒþ\x15\x05ëè{<t°{t%\a¨;fS\x12öª¯;4e-\u008dæ¤ç\x1c\u00adâZ.GŠ\nü~Uƒ„¤¶\x13&\"\x0eðuo¦“\x13>{c¿ÃJ#ëªúØe›t¥Þ3\x0fË“\b綽¥,\x15ÐË›‡÷‹|®k\x1fµ$†Ë³ÇŽ¼²Ÿ|m#ë‹{\f¶\x13\u008fûB6Òø•5Ó`Ç\x13«¤k+†ƒ³¨‹¤F;Œ:\x03²B\bs`>¸\u008fÓuFð‡[{u»C›\x03W0ƒ\x1bk¦\x0f°?`cHˆ\vŽ;\x03k\x10æ\bw€ƒàDÃ\x17˜¬’\u009d¥Ó\x13»\x17%€Ãl" 8c41ceaf5e828aafda42cc07e0bb27c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ca74fae1 = "\x14rÜ›\x01¨PTÝY¶ëÞ½Ã}i(-rÙ\x11¹›²d\u0081ÂñÈ2h4§ÒÛ¦½hÍ×ÊÔ\x1b7¸Vó‡å.Ø?;\býî'¸\rÒþ\x15\x05ëè{<t°{t%\a¨;fS\x12öª¯;4e-\u008dæ¤ç\x1c\u00adâZ.GŠ\nü~Uƒ„¤¶\x13&\"\x0eðuo¦“\x13>{c¿ÃJ#ëªúØe›t¥Þ3\x0fË“\b綽¥,\x15ÐË›‡÷‹|®k\x1fµ$†Ë³ÇŽ¼²Ÿ|m#ë‹{\f¶\x13\u008fûB6Òø•5Ó`Ç\x13«¤k+†ƒ³¨‹¤F;Œ:\x03²B\bs`>¸\u008fÓuFð‡[{u»C›\x03W0ƒ\x1bk¦\x0f°?`cHˆ\vŽ;\x03k\x10æ\bw€ƒàDÃ\x17˜¬’\u009d¥Ó\x13»\x17%€Ãl" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 8c41ceaf5e828aafda42cc07e0bb27c0N.exe File created C:\Windows\apppatch\svchost.exe 8c41ceaf5e828aafda42cc07e0bb27c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c41ceaf5e828aafda42cc07e0bb27c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe 2344 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 2344 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 30 PID 1700 wrote to memory of 2344 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 30 PID 1700 wrote to memory of 2344 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 30 PID 1700 wrote to memory of 2344 1700 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c41ceaf5e828aafda42cc07e0bb27c0N.exe"C:\Users\Admin\AppData\Local\Temp\8c41ceaf5e828aafda42cc07e0bb27c0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2344
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
218KB
MD598cd2ccfe7727e05a7ad04ee8f521812
SHA1874d9b4e15a1dda95c19b4b6c8ed9d8a8a68cba5
SHA256fb1893fb3f068642f67d71084268410325229f15a048f9977eef65a221018edb
SHA512b6e1b25584f0d77d47b0c49d203e77e4a91ab972626ddf0fa7ce8171d8f2af2fecd35a3579e8f5e36686b03bc46573846f7d2a055b0a1e150216c55a975b3df5