Analysis
-
max time kernel
110s -
max time network
16s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
07/08/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
7c98ca821480f4152d9e9cd6d92b8c40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c98ca821480f4152d9e9cd6d92b8c40N.exe
Resource
win10v2004-20240802-en
General
-
Target
7c98ca821480f4152d9e9cd6d92b8c40N.exe
-
Size
244KB
-
MD5
7c98ca821480f4152d9e9cd6d92b8c40
-
SHA1
fceb685c57d861376f0a4b5a0acb758a796f1f31
-
SHA256
eb6d4170d83f3e3a505263511b775c5857a6f56d95432ac0195ca13c5885877f
-
SHA512
dbf9ed6925922c8958163db85d22dad0c1be4b0b4fd873c5090c0b84f7454b2ded4c88d8820d393549bdf2ce9370fed573b0a4a4dfbea361158fd0493832b9d2
-
SSDEEP
6144:REXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:CAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1692 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe 2100 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f9645ac3 = "C:\\Windows\\apppatch\\svchost.exe" 7c98ca821480f4152d9e9cd6d92b8c40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f9645ac3 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 7c98ca821480f4152d9e9cd6d92b8c40N.exe File opened for modification C:\Windows\apppatch\svchost.exe 7c98ca821480f4152d9e9cd6d92b8c40N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2100 1692 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c98ca821480f4152d9e9cd6d92b8c40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1692 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1708 wrote to memory of 1692 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe 30 PID 1708 wrote to memory of 1692 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe 30 PID 1708 wrote to memory of 1692 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe 30 PID 1708 wrote to memory of 1692 1708 7c98ca821480f4152d9e9cd6d92b8c40N.exe 30 PID 1692 wrote to memory of 2100 1692 svchost.exe 31 PID 1692 wrote to memory of 2100 1692 svchost.exe 31 PID 1692 wrote to memory of 2100 1692 svchost.exe 31 PID 1692 wrote to memory of 2100 1692 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c98ca821480f4152d9e9cd6d92b8c40N.exe"C:\Users\Admin\AppData\Local\Temp\7c98ca821480f4152d9e9cd6d92b8c40N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 4363⤵
- Loads dropped DLL
- Program crash
PID:2100
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD54f6e790537b912873fe56e38100b8646
SHA14570c2c4f5664fe4e52a8dd8a83282d50244eb66
SHA256118743503894bc46878e312c825fcdf7a639061fc2fd80a7e594cbc70cdf1fd4
SHA51262edb233ec5bec257c7f77e1aed24b32a6f9222889202e62a3663aeaf34498c1bc0e4d5817d63627069eae4c32d74e395c387c9b76a0f0b3ee39dc71e188eb74