Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27/07/2024, 06:18
Static task
static1
Behavioral task
behavioral1
Sample
fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe
Resource
win10v2004-20240709-en
General
-
Target
fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe
-
Size
345KB
-
MD5
a2017d0b077dd29c081b2e8329dd3cdc
-
SHA1
91d75537d9f15e2246a355e03e336c550610d871
-
SHA256
fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b
-
SHA512
6941df5058ef76511f834e8a13cd1ea5e9f3aedc47d2f0a2a051661279daa19aa1900550d32b3c6ac33f5151259645312839f089711556892da7cadb25f136bd
-
SSDEEP
6144:OvYCmWoza0a1IMVVEb3uqRpwIUV9lMYmFQqZRRphLuVucfb8ehbjN8wS21bKRTw3:O3mWQa0a1IMVr9eMqbRzLuVucfb8ehbz
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2140 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\197bbe06 = "C:\\Windows\\apppatch\\svchost.exe" fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\197bbe06 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 36 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe File opened for modification C:\Windows\apppatch\svchost.exe fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2140 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2084 wrote to memory of 2140 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe 30 PID 2084 wrote to memory of 2140 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe 30 PID 2084 wrote to memory of 2140 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe 30 PID 2084 wrote to memory of 2140 2084 fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe"C:\Users\Admin\AppData\Local\Temp\fbbe526f961fb81329ac3463b0efb81a378c6b097fc1a070465fc55edfac942b.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2084 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2140
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
23KB
MD560c790889d836acae61ee755ba5c69f5
SHA17f1b814d60aedae94b0cc2c51540c13ad0d96d77
SHA2566f11dc64fc933c5f27f197f0d63bda0ac002da8ea82c1d4540f3dbc3a6a9256d
SHA51294b63e0d2c88f551a35476819c2429b8ae15fba9f599e49fe23767d9ece62c39d43c64d768fcde9b9ab3678b6e60abbdc264611191d20e9d4b51042b4d9eadf9
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
42KB
MD5396285b7e0cf95c67e4dd0393523c9f2
SHA1118da696524d84800c5ae6665cb78ef79acde8a6
SHA256f9edbb95aa7484e1c8f014b6b0c0d4d48e2c9df6e640ae4b79390297b7a50562
SHA512d876e870079d47dff2bbfb899c3132c9d97faf80d7575cc1e8c5b3710dc17a7947accb22968fc9ed8165151f20d73f76641d27fb2d7b85f67f6f49652641ca6f
-
Filesize
114B
MD5bfde1e9e9c32c1681a16139450c6909d
SHA17e669b927e6a75a10a0ca29e38e58ddcb49b725e
SHA256e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a
SHA512781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\login[3].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
345KB
MD59c172d5b8e911cf1fc09ff6f5640154e
SHA143570b86b60e341543c1be1c3065be01c6b366d2
SHA256e4ee5590a31eb37f713a8d7cff0e54e6d90a75a3f0bf65e9cd9c6752e0867e3e
SHA512a175f1eb6319aeb4e0cb660a2def97b6dbcb45272313a12a55e3d6f7128b612fbd3ee875445b816c8ff8771c58832470aa03139548dab38074e14fe83db9668a