Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
26/07/2024, 06:12
Static task
static1
Behavioral task
behavioral1
Sample
8c41ceaf5e828aafda42cc07e0bb27c0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
8c41ceaf5e828aafda42cc07e0bb27c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
8c41ceaf5e828aafda42cc07e0bb27c0N.exe
-
Size
218KB
-
MD5
8c41ceaf5e828aafda42cc07e0bb27c0
-
SHA1
7cdb5338dd6615c9d96defe80b2ed6b89ac960a1
-
SHA256
782f5c782938193d1a4a109fd78ea329a37236b27ffbfce0042c976238dc9c3b
-
SHA512
1b903715db324edc701faba47135385243e792c220badfce8fb93df9f2d02be045408783ed6236aac2e8bd911f8d5d7d53c3982b80a92d3c200826cb5699e202
-
SSDEEP
3072:Evm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:S1SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2488 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a1671382 = "ó‚BStøÐ\x01\x19²”mä\x15Ì\x14J*Ì\x1cýjÝ\x04¯RÊRÉ–‘°î´\x18nL\x1døFq^éÖ´<ø\fü¦©" 8c41ceaf5e828aafda42cc07e0bb27c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\a1671382 = "ó‚BStøÐ\x01\x19²”mä\x15Ì\x14J*Ì\x1cýjÝ\x04¯RÊRÉ–‘°î´\x18nL\x1døFq^éÖ´<ø\fü¦©" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 8c41ceaf5e828aafda42cc07e0bb27c0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 8c41ceaf5e828aafda42cc07e0bb27c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c41ceaf5e828aafda42cc07e0bb27c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe 2488 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4396 wrote to memory of 2488 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 87 PID 4396 wrote to memory of 2488 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 87 PID 4396 wrote to memory of 2488 4396 8c41ceaf5e828aafda42cc07e0bb27c0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c41ceaf5e828aafda42cc07e0bb27c0N.exe"C:\Users\Admin\AppData\Local\Temp\8c41ceaf5e828aafda42cc07e0bb27c0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2488
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
42KB
MD5e7ca5d072cd92a9c0b96df17512d25da
SHA180a4a868ef199536d3cdf9341573c78b978f12c9
SHA256628f1a355d854ef30d58f2751bc61b7b432e2aced622237cd5823ee1df9dbe9b
SHA512caf3378683a427fa8c57ebf40a7c16044392d847ac2867812a0e2107e4b5b9c1af0dba17b0c5cef38368fb662d0248a9877fe7643fa0d5fea98ca2b21312df21
-
Filesize
23KB
MD5f2082d109fc19a7c4f57382fab89ea12
SHA172f017ac9a77f88fc89dde0cc80dc68e45a83184
SHA256ae20007ba81d9e7d7fae26296e8cbb78c9c8ea9817be19d4281560c5ab27c58d
SHA512e9da2ca5797d9abc4675b05b8f786c546edf0c901b1d2c47c293227a8bc240b76e1e6ace255a0a161df214c9a3f996f7f68a79b56fb344ba3e466b7a788ccd93
-
Filesize
218KB
MD592635c310d5df0832d43b92c92d67b33
SHA1ae8905b6640f1dd16a31f956455d6fef3dbdfdb8
SHA256b4a7cee5b6a67a9ee41a66599b6ec01173b31b8b2eb1eb0b053f9001daaf41aa
SHA51288813bab7d5cff08c28092165425fc44ebb1bb238eb9cf01981d29ec071d36257725b398a3b486b95090b15813977da1ae77b886a7e3a1bec615cbfcacb0d4ba