Analysis
-
max time kernel
150s -
max time network
142s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
09-08-2024 04:01
Static task
static1
Behavioral task
behavioral1
Sample
f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe
Resource
win10v2004-20240802-en
General
-
Target
f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe
-
Size
206KB
-
MD5
ef65e7799dd45236b9b6f065640b898e
-
SHA1
5f0d2332033ec3a83474e5e7371bb5684b21ba9d
-
SHA256
f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff
-
SHA512
265e5fbd5631fcabaa65cca7e51c80475b6974bf0dbadd915816f24520b29352a3b0e7311c83faa02c68b34f3f9b99954a8ef162243a90956ac59023a29945d6
-
SSDEEP
6144:hu6ABIdHMnMMYGlPtFYmeiGLaMt8ApYUBvNdP4y2:huLIHMhPtFvei8aM2Aa8N+y2
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2084 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8680ddc4 = "C:\\Windows\\apppatch\\svchost.exe" f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe -
Drops file in Program Files directory 19 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyrysor.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe File opened for modification C:\Windows\apppatch\svchost.exe f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1506706701-1246725540-2219210854-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2084 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe Token: SeSecurityPrivilege 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe Token: SeSecurityPrivilege 2084 svchost.exe Token: SeSecurityPrivilege 2084 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2560 wrote to memory of 2084 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe 30 PID 2560 wrote to memory of 2084 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe 30 PID 2560 wrote to memory of 2084 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe 30 PID 2560 wrote to memory of 2084 2560 f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe"C:\Users\Admin\AppData\Local\Temp\f278b9b6ab6563f079f95427355bef86bd238445471cf641e1369d58f667c6ff.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2084
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\EP4MCZZ9\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
206KB
MD52ee9212628f2bfeeff05eabd5cb7ff40
SHA1ebaf8b0e25858a2be243ec0bf8025be2085e7050
SHA256933f7e23149d2bcd0596c59491ad928dcc41571098badc3b9b7edc6a4bc33b89
SHA512de73e3034571cc3ca84936d278e448ebb2052a35edffd60cc399c3d1c801103d29e6b10ca823958738f3c6275aca1ea58039b4b88c66ee8909e9643582cf6df9