Analysis
-
max time kernel
148s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
02/08/2024, 06:54
Static task
static1
Behavioral task
behavioral1
Sample
f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe
Resource
win10v2004-20240730-en
General
-
Target
f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe
-
Size
355KB
-
MD5
cf51d4cfc5ccf71f82071e19845e4858
-
SHA1
0d6edbf98b8ec3ea5b4a7c6a376decf64895b322
-
SHA256
f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236
-
SHA512
ba18237a667b0e43b33f8f14de6b80a34acdce8615f811ad8931bc1cef136d737ef08a792825f399c417bb2bb339b05c62135cd5b382c2cacd36634b9d956fea
-
SSDEEP
6144:73EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9EiS:YmWhND9yJz+b1FcMLmp2ATTSsdS
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1704 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\bcd3b3cf = "IHòÇ'÷\u009d\x1d¦}ÑW2\b\u008dÛÆIÞô%ç¢\"ýù¡À/À`b%>j²6ö\t>>n]\x18J8úºò\x16iµ‚Vî\x02&6¥Þ@¥:8†\x12NÆ¡€Ù‘1N®¦8®ð2\x1e:\x0eÍ6*áJfŽh\x05iîŠ\x1e®v\x0e¨–Òõ¢˜\r¡\x12ÉP\x10&î…*èP™‚&æV\x06 ¸¾\x0e‚ÆvøÆ\x10ÞÖ\x11&‚\x1e2Ö &ºÑê¢^\x1eI*ž.Ú¦\x1a&(Jjž°^åH°¾²Ú¸6Þ\x12š\"]Å€¦YÕ&Ð&\x16À•\u008dZpb8žzæBV6–.ÒÝ®æIíÒBvör–\"˜ˆJq9⢽åŽnò&\x1d%BrЍ\x0eñè5š†F\x1a6¦\x1d\u00a0ÎþöµHòn²Ò>]\u00ad¦ÆJ" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\bcd3b3cf = "IHòÇ'÷\u009d\x1d¦}ÑW2\b\u008dÛÆIÞô%ç¢\"ýù¡À/À`b%>j²6ö\t>>n]\x18J8úºò\x16iµ‚Vî\x02&6¥Þ@¥:8†\x12NÆ¡€Ù‘1N®¦8®ð2\x1e:\x0eÍ6*áJfŽh\x05iîŠ\x1e®v\x0e¨–Òõ¢˜\r¡\x12ÉP\x10&î…*èP™‚&æV\x06 ¸¾\x0e‚ÆvøÆ\x10ÞÖ\x11&‚\x1e2Ö &ºÑê¢^\x1eI*ž.Ú¦\x1a&(Jjž°^åH°¾²Ú¸6Þ\x12š\"]Å€¦YÕ&Ð&\x16À•\u008dZpb8žzæBV6–.ÒÝ®æIíÒBvör–\"˜ˆJq9⢽åŽnò&\x1d%BrЍ\x0eñè5š†F\x1a6¦\x1d\u00a0ÎþöµHòn²Ò>]\u00ad¦ÆJ" f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe File created C:\Windows\apppatch\svchost.exe f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe 1704 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2268 wrote to memory of 1704 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 29 PID 2268 wrote to memory of 1704 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 29 PID 2268 wrote to memory of 1704 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 29 PID 2268 wrote to memory of 1704 2268 f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe"C:\Users\Admin\AppData\Local\Temp\f2e863b0cc41034e72626dc77278cfc744ff7639618906d1b0ae5bcbe1050236.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
355KB
MD5a1e8055ddee78ba5898fa9909908ffd2
SHA1b8792cb26a0980acfc92c88743c20216d8d87977
SHA2560465401d15162edf1d1d3a2dfc0dad84967b124055d907efacb1fb414c1fd170
SHA51248079f80cffca8213b271af1868e601e9759486d7ee5cfdf77d5ace53aae9f4f87188483620c9ca22d5c33acba6dc292ad71c329ca63f29442835271368c869a