Analysis
-
max time kernel
110s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
06/08/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
6fa486d264c77822d85d363bbdcb5b80N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
6fa486d264c77822d85d363bbdcb5b80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6fa486d264c77822d85d363bbdcb5b80N.exe
-
Size
218KB
-
MD5
6fa486d264c77822d85d363bbdcb5b80
-
SHA1
613ebd0dea6b2e346fdf129a9a61e677684ae823
-
SHA256
9cca50548b30249eb298a49cfc0984fdfeae67233251e26e78cf1a7e6b7e6f98
-
SHA512
031fed33ab6ea69b1f2384d51652430621f046527aa7199d25c0e0fd04d7fdbdd8eae02f075dc500fd4b585c1ca64ddbd2198faae67adb8438194660ef323543
-
SSDEEP
3072:5vm4SZsQrNzPrl6rjGMjp39d4u8iqddCxMIJOb2o5DsBPjim6hwM2H6:N1SyAJp6rjn1gOObn4b6h9h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1968 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\23142db1 = "\x12<Ý}3UЏéÉðÈþZÙmÂ8^vP'\"W\x05·[ØÚÿ\t¶FZ\x04ŠF\a\x06\\^2\x1aª¶^$bÊŒë\x1e\x06\nú±žk˶ÿÛï‚\x1363.\x11'vÉ¿‰òN${\x7fIŒ6\x12sf¼kS_FR?†O\x13Œ\x0f«{~§ÔyfWR{Þº9F&q!;†Ú\x1a\x12Ê\x06ly:\x02\vî/Êb>©\nª\x7fKꓪ44G¡\x16–ÚÚæl_ó§ô¿Ù\tF—ç^é”ÉñËÉ\x0f\x1fžn\x063ªo’FT¤b\x1bÆ2Á\x0eG\vJâÄÉ\x0f\x12ª4×ê¢$¬6Â{\x11äbÛÉg\u008fé?ñ“ßöŠLé×\x11¢\x01.ìü6ñb;$s2™\x12\nþÞ§ÿ«\x0eg\az>z\"²ùæîêîlbÂÏ" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\23142db1 = "\x12<Ý}3UЏéÉðÈþZÙmÂ8^vP'\"W\x05·[ØÚÿ\t¶FZ\x04ŠF\a\x06\\^2\x1aª¶^$bÊŒë\x1e\x06\nú±žk˶ÿÛï‚\x1363.\x11'vÉ¿‰òN${\x7fIŒ6\x12sf¼kS_FR?†O\x13Œ\x0f«{~§ÔyfWR{Þº9F&q!;†Ú\x1a\x12Ê\x06ly:\x02\vî/Êb>©\nª\x7fKꓪ44G¡\x16–ÚÚæl_ó§ô¿Ù\tF—ç^é”ÉñËÉ\x0f\x1fžn\x063ªo’FT¤b\x1bÆ2Á\x0eG\vJâÄÉ\x0f\x12ª4×ê¢$¬6Â{\x11äbÛÉg\u008fé?ñ“ßöŠLé×\x11¢\x01.ìü6ñb;$s2™\x12\nþÞ§ÿ«\x0eg\az>z\"²ùæîêîlbÂÏ" 6fa486d264c77822d85d363bbdcb5b80N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 6fa486d264c77822d85d363bbdcb5b80N.exe File opened for modification C:\Windows\apppatch\svchost.exe 6fa486d264c77822d85d363bbdcb5b80N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6fa486d264c77822d85d363bbdcb5b80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe 1968 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3868 6fa486d264c77822d85d363bbdcb5b80N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3868 wrote to memory of 1968 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 86 PID 3868 wrote to memory of 1968 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 86 PID 3868 wrote to memory of 1968 3868 6fa486d264c77822d85d363bbdcb5b80N.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\6fa486d264c77822d85d363bbdcb5b80N.exe"C:\Users\Admin\AppData\Local\Temp\6fa486d264c77822d85d363bbdcb5b80N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3868 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1968
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
218KB
MD5c5954530c188541db1ab2fbd1c75ac74
SHA1a0f6db902f067142c91c7a76ce9257d2f431baca
SHA256ab521370c358e3da93e758f92d8d252cf70245a032883b78dd80d05442e9e8dc
SHA5129927e5308aea42c979226546651d6a1a20499a39e51d4491986164da17fa70a29af9d178a7a127e69f6d90a227679abc391c2a4bc377c79d47c2101fb2c87e5b