Analysis
-
max time kernel
111s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
14/08/2024, 18:19
Static task
static1
Behavioral task
behavioral1
Sample
4f5ac6a66f96ae6e6ee7e794305a4030N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
4f5ac6a66f96ae6e6ee7e794305a4030N.exe
Resource
win10v2004-20240802-en
General
-
Target
4f5ac6a66f96ae6e6ee7e794305a4030N.exe
-
Size
576KB
-
MD5
4f5ac6a66f96ae6e6ee7e794305a4030
-
SHA1
c596e61e59652f1b178e9506c2a0b09cb2687d97
-
SHA256
8f68569e961ef2fc68a80a65fad60a47cbf5cea8ba3ead52b8e391ed77691f5f
-
SHA512
23b75b8f24a09190b151f6ba4e29592637c620a618a8a6f4e9bb221eec25344dbfbb030b245963b4de6a5de14a575a8e5cb878a1d67c4aeec0f391c3cac7e43e
-
SSDEEP
12288:2mWhND9yJz+b1FcMLmp2ATTSsdxmWhND9yJz+b1FcMLmpG:2mUNJyJqb1FcMap2ATT5rmUNJyJqb1Fl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2176 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\812479bd = "CŠDHñõÿD,ðœ\x15\u008f‡\x03ê× ×³ÐY\b\aÜ´«\x0eeÀ‰\x17¿O<œ\u00a0Hט˜Àƒk\v¯\x13ï«8\u008fßÐ?‡gS" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\812479bd = "CŠDHñõÿD,ðœ\x15\u008f‡\x03ê× ×³ÐY\b\aÜ´«\x0eeÀ‰\x17¿O<œ\u00a0Hט˜Àƒk\v¯\x13ï«8\u008fßÐ?‡gS" 4f5ac6a66f96ae6e6ee7e794305a4030N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 4f5ac6a66f96ae6e6ee7e794305a4030N.exe File created C:\Windows\apppatch\svchost.exe 4f5ac6a66f96ae6e6ee7e794305a4030N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f5ac6a66f96ae6e6ee7e794305a4030N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe 2176 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2628 wrote to memory of 2176 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 31 PID 2628 wrote to memory of 2176 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 31 PID 2628 wrote to memory of 2176 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 31 PID 2628 wrote to memory of 2176 2628 4f5ac6a66f96ae6e6ee7e794305a4030N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f5ac6a66f96ae6e6ee7e794305a4030N.exe"C:\Users\Admin\AppData\Local\Temp\4f5ac6a66f96ae6e6ee7e794305a4030N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2628 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2176
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
481B
MD5f31b58c555029b96b784d24db55e864b
SHA1bc315b6163f2f09842f45b7360e893687dbab6c5
SHA256915810f13e94ca93ee2cb16b4779dd05d85d1c0d904c0901027fde15a89284b9
SHA512cadade17f7ddf13eb5f798156d59b714bc1226f30427fcca059a6e15d02dbdac13f3f8b4949b9e472d2daa987a817613b5499156d292976bb7b9ec771a78d859
-
Filesize
576KB
MD5d3c3cd857303e51c28472336ef239e0d
SHA11b28d27acb547c44846ea1d129bf6aab99b44e86
SHA256ed81110374b6773c12b269724f384a4ebd8d632f648f10042bc36f354c8d0b23
SHA512aa6399edfb8284e0f7a955ddbe47c0897da7057d86f2704cfbe6f97319c136b8409b17c4085a3d91835933f23e9c9bce1660f38f38e4957984b38e1c3f48469e