Analysis
-
max time kernel
120s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
03-08-2024 03:53
Static task
static1
Behavioral task
behavioral1
Sample
46db3e304e9640f9661832428bdc15f0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
46db3e304e9640f9661832428bdc15f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
46db3e304e9640f9661832428bdc15f0N.exe
-
Size
204KB
-
MD5
46db3e304e9640f9661832428bdc15f0
-
SHA1
3de5ea13983e9260c6c45fb2c10df414992256d4
-
SHA256
008f00ab3faae0a08cc6bed2164bee392f36b5bf2b387f56856b573cab42f5de
-
SHA512
d30762e3928a503012a37e4d3c82fd137bfb2cae41abfbb8e4410aa04025ce6f218d21840eaed5956298ea1d326d5b6a70c2732770b346650cdcd3e14d9865c1
-
SSDEEP
3072:HaSdR9c1/fuWL0AjMilpCOT+kICtApWFK1WHk25weLcKznxbQFFNj6QU:H7oFuhAwM+kICeseWEEPznxbJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2784 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2432 46db3e304e9640f9661832428bdc15f0N.exe 2432 46db3e304e9640f9661832428bdc15f0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e5a3dc9f = "C:\\Windows\\apppatch\\svchost.exe" 46db3e304e9640f9661832428bdc15f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e5a3dc9f = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 32 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 46db3e304e9640f9661832428bdc15f0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 46db3e304e9640f9661832428bdc15f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 46db3e304e9640f9661832428bdc15f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2784 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2432 46db3e304e9640f9661832428bdc15f0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2432 wrote to memory of 2784 2432 46db3e304e9640f9661832428bdc15f0N.exe 29 PID 2432 wrote to memory of 2784 2432 46db3e304e9640f9661832428bdc15f0N.exe 29 PID 2432 wrote to memory of 2784 2432 46db3e304e9640f9661832428bdc15f0N.exe 29 PID 2432 wrote to memory of 2784 2432 46db3e304e9640f9661832428bdc15f0N.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\46db3e304e9640f9661832428bdc15f0N.exe"C:\Users\Admin\AppData\Local\Temp\46db3e304e9640f9661832428bdc15f0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2784
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
41KB
MD5c12e95b4a2bf40b826f09ed0dcc147bf
SHA1daad276a9851dccf792fe5cf327a82557d80e11f
SHA2561d5e9a3fff75de9add09d852ddcac3085b05bf5b2523f4218514c5a3a4066c63
SHA5121c033cf74bc624d736b6e60039cff2c5936bd0a9098ab3b5d2e7694b4d315414477a47197a5b90d55dba76a742257bed4b0381b5bb10eaabe24bffaf28414e57
-
Filesize
114B
MD5bfde1e9e9c32c1681a16139450c6909d
SHA17e669b927e6a75a10a0ca29e38e58ddcb49b725e
SHA256e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a
SHA512781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396
-
Filesize
481B
MD5ad5e0892d6dbf3ca9c431e69d4c70bbe
SHA1fa94f8a853db957ddce99989333310353a02a1a0
SHA2566af8f224d4c9dd80bccd3bb80356f40a7a7b22b31f304970b6163bd92d31e210
SHA512b169168920c32b6adb84e76781078514a9d4a5f7522983134ef7485b167dc859cb5df197d4bf6f5b8657ee8917f36dc864c88dc72bcf1878e66c2f0dc0d5a70b
-
Filesize
1KB
MD51c3a942c0b44ae69bb9f05bcc1fd3065
SHA1832fa9a27093eb636253c36658212baaa42130ac
SHA256de92ad2933d432ac8a00804c873937305b88e6c648e6144052be345fc4df0000
SHA51246fdfa810da56ae4e5311896f045296b44b818cb41c4bfa5656388a99de85e5b2a143cf7b3b5d46c33145d061ef481acb47fcf46dc63f327adbd88b5d457220b
-
Filesize
24KB
MD515a8272444ea922b39b9d5abd6287bb7
SHA15e70a6b57996e3620a9dbd7c76164519aa04010c
SHA25623121316d7692212b54ab5d4735948ed32148d03911875780269cd4829d77034
SHA51270af052da1888810580214302dddb6864a2db54c79a9935d699aa1cecc44f364891d24461039635e0fe1a1ed84e8f1c7b2be9d550bc700bac792168a8c6c3540
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\Z7V06J7Q\login[3].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
204KB
MD541e163318bbfbf9ba12b70e5bcff02a7
SHA197418a31f929dd72c3f1e05d42add3ed8fefef58
SHA256cd5efa2f100072de8ea7a418b23eab4cf03533173583a115503021bad18f1d40
SHA5120419d72114adedb0f0585afee673adb7d1a317a8f7104fb6463a75756731664dd3ded8c66aa77b6e5a4e12c5d8ed7fad01c6ea025c5513ab2403b4d11e9fc07a