Analysis
-
max time kernel
114s -
max time network
119s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
07/08/2024, 06:33
Static task
static1
Behavioral task
behavioral1
Sample
7c98ca821480f4152d9e9cd6d92b8c40N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7c98ca821480f4152d9e9cd6d92b8c40N.exe
Resource
win10v2004-20240802-en
General
-
Target
7c98ca821480f4152d9e9cd6d92b8c40N.exe
-
Size
244KB
-
MD5
7c98ca821480f4152d9e9cd6d92b8c40
-
SHA1
fceb685c57d861376f0a4b5a0acb758a796f1f31
-
SHA256
eb6d4170d83f3e3a505263511b775c5857a6f56d95432ac0195ca13c5885877f
-
SHA512
dbf9ed6925922c8958163db85d22dad0c1be4b0b4fd873c5090c0b84f7454b2ded4c88d8820d393549bdf2ce9370fed573b0a4a4dfbea361158fd0493832b9d2
-
SSDEEP
6144:REXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:CAylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4200 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\65136aa0 = "C:\\Windows\\apppatch\\svchost.exe" 7c98ca821480f4152d9e9cd6d92b8c40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\65136aa0 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 7c98ca821480f4152d9e9cd6d92b8c40N.exe File opened for modification C:\Windows\apppatch\svchost.exe 7c98ca821480f4152d9e9cd6d92b8c40N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1304 4200 WerFault.exe 92 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7c98ca821480f4152d9e9cd6d92b8c40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4200 svchost.exe 4200 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3740 7c98ca821480f4152d9e9cd6d92b8c40N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3740 wrote to memory of 4200 3740 7c98ca821480f4152d9e9cd6d92b8c40N.exe 92 PID 3740 wrote to memory of 4200 3740 7c98ca821480f4152d9e9cd6d92b8c40N.exe 92 PID 3740 wrote to memory of 4200 3740 7c98ca821480f4152d9e9cd6d92b8c40N.exe 92
Processes
-
C:\Users\Admin\AppData\Local\Temp\7c98ca821480f4152d9e9cd6d92b8c40N.exe"C:\Users\Admin\AppData\Local\Temp\7c98ca821480f4152d9e9cd6d92b8c40N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3740 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4200 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4200 -s 8163⤵
- Program crash
PID:1304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4200 -ip 42001⤵PID:4336
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4448,i,1602949858158667699,12464335823361976127,262144 --variations-seed-version --mojo-platform-channel-handle=4412 /prefetch:81⤵PID:4348
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5f423b1bdc032198674aabc7fb5d51dab
SHA137c62f373d0738460921504f5860426e39952885
SHA256681f141260795c9c42fbc80ed0919e1ccc81a8c98331ecaf567b140d0fa20f27
SHA51299af2fa2b9d42d25ba42c362db886da2bf7d02ab228892f7fb4cea0d210589730c4f466682d77f05d9fbc7e9c09d230e70972ca9125a661666baa79d36a1b493