Analysis
-
max time kernel
120s -
max time network
113s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27-07-2024 07:08
Static task
static1
Behavioral task
behavioral1
Sample
a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe
Resource
win10v2004-20240709-en
General
-
Target
a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe
-
Size
240KB
-
MD5
a5c9c7d6ce149ce7c0fcae5fb91ba650
-
SHA1
6d9423a0906cea9ad83fbcfdb3a9001c8e3ba616
-
SHA256
b1a0ec3b1b9900a2bd1b3ae8b7cccb6c3097d267c61720cedcb2ca0fc200d00f
-
SHA512
79a6d9ee797babbddda2329b763c07f1bf52e6a89b4cd18433bab8b55fc91cdcadd3780a8555d3165dba2fdce6dc07f4060c26ce2cc41faf24d78cd75640f07a
-
SSDEEP
6144:euOYYecObhLvkiL2XOdldJNifl4wwXCAjVrUEzvbeTIu//:9K1y9hrTiN4nBRrUS6Tf/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2844 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3acec3c6 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\3acec3c6 = "C:\\Windows\\apppatch\\svchost.exe" a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe File opened for modification C:\Windows\apppatch\svchost.exe a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2844 svchost.exe 2844 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4844 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4844 wrote to memory of 2844 4844 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 87 PID 4844 wrote to memory of 2844 4844 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 87 PID 4844 wrote to memory of 2844 4844 a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe"C:\Users\Admin\AppData\Local\Temp\a5c9c7d6ce149ce7c0fcae5fb91ba650N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
240KB
MD5a479ffa87119c5577d84e6cdd5023825
SHA1faebb84374d2da1f8211a21769d73a9c245fc40f
SHA256e30a42fb1e4f6945f49eea6d3c7a51b5533cf69fefca62fe871b723e886ab85e
SHA51281be30f0a31a5e80d501a62d76093f74158f85471fd82f1fdcaa403b7f78f9812d2a7e34449e762756cfaae34a8e05385408e22fb12c1f4f937da70cb214b1ea