Analysis
-
max time kernel
120s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
27-07-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe
Resource
win10v2004-20240709-en
General
-
Target
a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe
-
Size
240KB
-
MD5
a5c9c7d6ce149ce7c0fcae5fb91ba650
-
SHA1
6d9423a0906cea9ad83fbcfdb3a9001c8e3ba616
-
SHA256
b1a0ec3b1b9900a2bd1b3ae8b7cccb6c3097d267c61720cedcb2ca0fc200d00f
-
SHA512
79a6d9ee797babbddda2329b763c07f1bf52e6a89b4cd18433bab8b55fc91cdcadd3780a8555d3165dba2fdce6dc07f4060c26ce2cc41faf24d78cd75640f07a
-
SSDEEP
6144:euOYYecObhLvkiL2XOdldJNifl4wwXCAjVrUEzvbeTIu//:9K1y9hrTiN4nBRrUS6Tf/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ded9f96e = "C:\\Windows\\apppatch\\svchost.exe" a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ded9f96e = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe File opened for modification C:\Windows\apppatch\svchost.exe a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2120 wrote to memory of 2544 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 30 PID 2120 wrote to memory of 2544 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 30 PID 2120 wrote to memory of 2544 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 30 PID 2120 wrote to memory of 2544 2120 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe"C:\Users\Admin\AppData\Local\Temp\a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2544
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD55f7960800850435d05d9265b2d4bf2ff
SHA10c349d22432909efe5adb74b593fd78188cb3baf
SHA256389160935f0c52806150f278fc04fd51ead66bcf652d43e64c3ef92f651af5a2
SHA5120649f95375afb8b62d5c7a2a21c56669db641f33b626ec7dab5583cf68a1458f6badee3222cba0ab46cb13b39a8d7b4d06ee510869ba8c065ef593cc45f65939