Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05/08/2024, 06:56
Static task
static1
Behavioral task
behavioral1
Sample
61107727db4318f052cc0feeb3451a40N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
61107727db4318f052cc0feeb3451a40N.exe
Resource
win10v2004-20240802-en
General
-
Target
61107727db4318f052cc0feeb3451a40N.exe
-
Size
218KB
-
MD5
61107727db4318f052cc0feeb3451a40
-
SHA1
9d35ec57faec9acc010b6b5cd2ef5d6f83a124e8
-
SHA256
4aa45ab51b90dc65383ea4731d0ef6a024956172d515851e589d43e06575d1fa
-
SHA512
5330a6c364f86fdcbfb3d253b553e6e81dda7489154c7299a2c811f975f655ca6e9c49e2d39d17aa8e2c9282b299783663bed4fc6e09b46cc7fe9cbbb0059340
-
SSDEEP
3072:bvm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:j1SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3660 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\18df951f = "\x1d\x03šÐ€GjNh~јøÀ\x17æ\x1a¦?ýãQbq¡”3\x03$Ï3¶á‰È\u008dß1_/\r\x11ï¯)q6^9\x01ðE-íaé\x17åßa±\x0e¡\x01uÎ!.ŸQ†íùyߎ€až™·9\x10…×ÉÑ™!5\rpQ}¿\x01ñ‰áÙùMm\u0081\raQ yIî\x19\u009d…hié\tŸýX\x10ù¿A¡ïáÁ¹–\x01UèUáPE)·" 61107727db4318f052cc0feeb3451a40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\18df951f = "\x1d\x03šÐ€GjNh~јøÀ\x17æ\x1a¦?ýãQbq¡”3\x03$Ï3¶á‰È\u008dß1_/\r\x11ï¯)q6^9\x01ðE-íaé\x17åßa±\x0e¡\x01uÎ!.ŸQ†íùyߎ€až™·9\x10…×ÉÑ™!5\rpQ}¿\x01ñ‰áÙùMm\u0081\raQ yIî\x19\u009d…hié\tŸýX\x10ù¿A¡ïáÁ¹–\x01UèUáPE)·" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 61107727db4318f052cc0feeb3451a40N.exe File opened for modification C:\Windows\apppatch\svchost.exe 61107727db4318f052cc0feeb3451a40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 61107727db4318f052cc0feeb3451a40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 4860 61107727db4318f052cc0feeb3451a40N.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe 3660 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4860 61107727db4318f052cc0feeb3451a40N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4860 wrote to memory of 3660 4860 61107727db4318f052cc0feeb3451a40N.exe 86 PID 4860 wrote to memory of 3660 4860 61107727db4318f052cc0feeb3451a40N.exe 86 PID 4860 wrote to memory of 3660 4860 61107727db4318f052cc0feeb3451a40N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\61107727db4318f052cc0feeb3451a40N.exe"C:\Users\Admin\AppData\Local\Temp\61107727db4318f052cc0feeb3451a40N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4860 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
24KB
MD5dd54ca0391c085c9fa31e3b18b1700a0
SHA1bd21d70f7c5955ad5bdda2fc8e6af0bba082286f
SHA25672dd19fdb469653f07b87ae3b99106df4b10932f53d3f5e44c21518f98cf2acf
SHA512d9adbfc63896b7ae4b20dd3ce5d82982b841561afb6a3f49df607161447a5b8caa2cb88dc10cca339cec15cd4d9e1fb8061709e0711aa4f4c5d398defd0a3088
-
Filesize
42KB
MD513f2711e921e68155c8677c9353d641e
SHA17c35a0170d985ecbae9309224ef055e89b10adb6
SHA256ecd5ccf4dcd6735d8bdd4b8a6bd3b5c2d66637eccc5567f9b724cbaf27916848
SHA512e4708ef3c3c903a1a3e931258d7a57116b3d90e2784acbcd27fc81eb8ac36b9c2592d0d3c5cac78d3d13cec5d08c849bfd22acc2b2c6c055f3529009f6304c83
-
Filesize
42KB
MD5f22cc4fbfb886c0f03a669b0b94b2d5f
SHA1242e1531acd367407f173e961c2ceef2a392d01f
SHA256327e655759fe8971b68e705557700fdd2d2985f02d993384cc1975155f3c0f8f
SHA512c04ded4ad7740553901d4d2bf90f17db10dd3eae590183c0f9b105d755c32641db1a4a13165ae8b5b4686bba222472c8dd75a51fe5b8a996a56354a014164985
-
Filesize
218KB
MD5cc50068e0d4c65538761ad9e2998d752
SHA17aee19ac18d1273d6782d10397a2bbba2a570ce2
SHA2562470bf103b02f84803d7f6267b5e9d27893ccd86c0e0a42867046d353861b00f
SHA5126efd68d7b3edbb64f185fdd38d545f26878e19d770a1f9a973b89b3ed0a8821a7ea9cbafefeace2ed6602aaf4e973904f801f408dada54d87fc35dc75c93ea2a