Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240709-en -
resource tags
arch:x64arch:x86image:win10v2004-20240709-enlocale:en-usos:windows10-2004-x64system -
submitted
27/07/2024, 07:45
Static task
static1
Behavioral task
behavioral1
Sample
aa0c16590176a9de2d7df083a8e1a1c0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
aa0c16590176a9de2d7df083a8e1a1c0N.exe
Resource
win10v2004-20240709-en
General
-
Target
aa0c16590176a9de2d7df083a8e1a1c0N.exe
-
Size
203KB
-
MD5
aa0c16590176a9de2d7df083a8e1a1c0
-
SHA1
52e39393bfd57c1841897dda555881abf7650ccb
-
SHA256
196f8e254fc6dd0832756fcc4b7210d22e76b4a018262be395a6d5af6a56f4b9
-
SHA512
f23ad47dc4bf8662dcda0d128487158062f3ee00d121541d7377353b44f17ce2feaeda1e4aa90046e358e113838a18e41ed6417e69b0b5dc524ddc366325f5e6
-
SSDEEP
6144:DEL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:SnksHxyXcfIRhFE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2364 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7bca4a5b = "G\tH¥5³Ç>%\x7f)j;“õ\x1eQÑ+‘Ë\x11€ËŒ¸ØiOtêØèúK2ŸÚ¸1c¨Ô\x05Ûí´Ë·0me+C‹#¤sx`tC\x1bzK‰€ˆú\x04гŒéäO‡±ÙÇð—Ñ#³·¢‚\\\x03ÜÉ0zmõDÐÛÝ£¨{°é©\rÚzA;#i5'óŒ±]åòCcÀ;e½\x1dm(‡Ì/àwEÌ»\x14\"ë;«\u009dbCW;Ÿº|ˆÂ\x03*\"å8CŠóØ(s3PU›Ë\u0081àÄçшÚa£C³\a5Ë-[`\x02%â\u008f´\r\x13ÃÑ©›IcåHK™<$‰\u00ad\x01\x12©y‰\x12PqróÒ\x03\vϨã ÒÁï¯/¬\u0081K+<\x1cqÈByÅá|o»º3ôª!:Ø×ExÐâÈ\f”" aa0c16590176a9de2d7df083a8e1a1c0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7bca4a5b = "G\tH¥5³Ç>%\x7f)j;“õ\x1eQÑ+‘Ë\x11€ËŒ¸ØiOtêØèúK2ŸÚ¸1c¨Ô\x05Ûí´Ë·0me+C‹#¤sx`tC\x1bzK‰€ˆú\x04гŒéäO‡±ÙÇð—Ñ#³·¢‚\\\x03ÜÉ0zmõDÐÛÝ£¨{°é©\rÚzA;#i5'óŒ±]åòCcÀ;e½\x1dm(‡Ì/àwEÌ»\x14\"ë;«\u009dbCW;Ÿº|ˆÂ\x03*\"å8CŠóØ(s3PU›Ë\u0081àÄçшÚa£C³\a5Ë-[`\x02%â\u008f´\r\x13ÃÑ©›IcåHK™<$‰\u00ad\x01\x12©y‰\x12PqróÒ\x03\vϨã ÒÁï¯/¬\u0081K+<\x1cqÈByÅá|o»º3ôª!:Ø×ExÐâÈ\f”" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe aa0c16590176a9de2d7df083a8e1a1c0N.exe File opened for modification C:\Windows\apppatch\svchost.exe aa0c16590176a9de2d7df083a8e1a1c0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language aa0c16590176a9de2d7df083a8e1a1c0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe 2364 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2756 wrote to memory of 2364 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 87 PID 2756 wrote to memory of 2364 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 87 PID 2756 wrote to memory of 2364 2756 aa0c16590176a9de2d7df083a8e1a1c0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\aa0c16590176a9de2d7df083a8e1a1c0N.exe"C:\Users\Admin\AppData\Local\Temp\aa0c16590176a9de2d7df083a8e1a1c0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481B
MD52611c1264a0b077d208d0763c85fa873
SHA1df911810cfa4e9cb103cb0d61bcfdc1bedb69373
SHA2569dab48aca843d632f77a60b36f344032134f90a6e2f67daa7069a035ab48094b
SHA512940f8e0f00fb6c27e699e0b54c25ea048f1a10f13103e7230160fbcac698b951ac1a81cc7623a429295ecee86be39f46a3257eba7ff88e0af83db12c46d6b022
-
Filesize
2KB
MD5799567ec2b11d9f212f890c5d3ced9aa
SHA14d01469f4430740ded8ea3859f8a46c2db5e13aa
SHA2568f7d3425de931bdf88a8f7fceb71f24db1c35ca9fce6d912b515d1b002845cae
SHA512d72f33f75b56cdc509a9e773b45a24bf5f26304a34a3f631050e8c5782ebeec831d4216670bd544a333c6eafa6e95579d94f72c43836be4e11ce1b095dc5f4d8
-
Filesize
203KB
MD578e9c14df3472b0cf9f163e82d2b0811
SHA1fe25d651f13134580aaed1743d099549a2c7fd98
SHA256bf2cba1b86f3e920c8bf86aec72f51ea196821052fb72f719d1f1341be8de68a
SHA512129863067d7618fed1841e8f5d31fbb8ce8644748ed40930dc6ee72faada1fea671c4e684ba614dd1291110588da6dfdf5c228a8d8dd2e2743a56b71b3d51914