Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
06/08/2024, 11:46
Static task
static1
Behavioral task
behavioral1
Sample
9da6ef2ef11d830f6fe358b44c11bbc0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
9da6ef2ef11d830f6fe358b44c11bbc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
9da6ef2ef11d830f6fe358b44c11bbc0N.exe
-
Size
212KB
-
MD5
9da6ef2ef11d830f6fe358b44c11bbc0
-
SHA1
84072a59ed98f175072ff7f2e8b247c82234241e
-
SHA256
39301cbe2a10c6fac369e9888ab60a780d87c6c4ab373ea92b417f506d9f49cb
-
SHA512
1e13b57101f2d5b2bd3e0a51ec7b8f241d38c6171f39d6c2ed1b004291e086b0e984d7559aa2c4047d8794a3522bbde6578722ffc479fb8efe40ada098104da4
-
SSDEEP
6144:Iob34ERMS/H7YAVsobrVn5G4E3Hi96mbQzJWFO8Omw4G:XboEj/8ASWM4Ki96/zqIKG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2292 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4e1716f = "Í×^\nm]z©ƒž77gnù\x1c)“½äÝyóU\x02ËæStPà¸\r\x11/râW¡âr§V¯þ}\u0090ÿÈ‚,(\x19ð&Cèÿ\x17\fldVd!Ô\t\t\x17\x1aÚ‰·ç0¹¡ð…©{~ÿ8ô¿HÔâ\x16\x04\x1fyiô4}\x11\t\u00adêjD\x1dÃo“\v+:‹ù•\x05ÕÚ§\x06Z!‹â" 9da6ef2ef11d830f6fe358b44c11bbc0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\4e1716f = "Í×^\nm]z©ƒž77gnù\x1c)“½äÝyóU\x02ËæStPà¸\r\x11/râW¡âr§V¯þ}\u0090ÿÈ‚,(\x19ð&Cèÿ\x17\fldVd!Ô\t\t\x17\x1aÚ‰·ç0¹¡ð…©{~ÿ8ô¿HÔâ\x16\x04\x1fyiô4}\x11\t\u00adêjD\x1dÃo“\v+:‹ù•\x05ÕÚ§\x06Z!‹â" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 9da6ef2ef11d830f6fe358b44c11bbc0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 9da6ef2ef11d830f6fe358b44c11bbc0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9da6ef2ef11d830f6fe358b44c11bbc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe 2292 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1512 wrote to memory of 2292 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 30 PID 1512 wrote to memory of 2292 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 30 PID 1512 wrote to memory of 2292 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 30 PID 1512 wrote to memory of 2292 1512 9da6ef2ef11d830f6fe358b44c11bbc0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\9da6ef2ef11d830f6fe358b44c11bbc0N.exe"C:\Users\Admin\AppData\Local\Temp\9da6ef2ef11d830f6fe358b44c11bbc0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1512 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2292
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
212KB
MD56d191d4372d8b9176d0c8de9e3f6ed9a
SHA1158067b898ce92ef77670d9259d6bf1daa63a550
SHA25602862db1b974d0771fae18d5f05d4e68c196eced77c1143dc96684c9f94f4596
SHA5122532488df2a6e34b755f3bf4c2e68054f5cdee6cc9b2541e1904e81c95f11fc9ae738b494a2923439f81bfc1ae8d8e4818ed6512eaabed9f4be73f214668b608