Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 03:51
Static task
static1
Behavioral task
behavioral1
Sample
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe
Resource
win10v2004-20240802-en
General
-
Target
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe
-
Size
203KB
-
MD5
0657ba734321626a97d1f62507bf35d5
-
SHA1
a3ff60f16b347cb8320cab38111f4d32449bc3a9
-
SHA256
afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c
-
SHA512
35e409cc7451f9138ad455d6d2e2afe58f3856eb29027caffb9a3a3ce48d8a5e06ff0d80c0310e033697561ebfe03d38e5c453862da630599d9d3d1c896b8468
-
SSDEEP
6144:uEL1lvsWYuOiMnGNuuF8XcfI2MPO7qhnhF9mD:XnksHxyXcfIRhFE
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1644 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7063c728 = "GŽ¸c\x15уKCߘ…|Ç—%\u00a0\x17|(\vþdÈNûíö¼Úü'€G\u0090G‰÷\x11wHÿ8¤‰çìä/xŸ‘‡8¬ïŸÀ\x0fœˆñ¬9¨ÐGÿ¼('ôÁW¼\fñt'\x0f<œ\tÏœŠ\x7fW\x17odÇ)Äd\x7f2ºß,·W7§Hô$)A§?ì×H\t”9T„ÿ¿<œ\x18œÈÜŠL\\Š4™wy’\x14™ÐàˆG\x0fÀÂL¿Ù·g¡„\x1aG'/\u0090œpT\x04—\x18¯¯Ê—ï?—\x1c‘gä¹d\u008fiߢ4øgIÏ1)Ì¡\bä?\x04W_Ї\u008f'Šhÿ\aZ˜B²\a\x0f”7\f9D¿ÔL\x0f\x04Äàù‡t/,¡Ü÷Ì\x1c_7x0w°Ê¤—ª\x17±÷ÜçW×Ìï4ß¿\x7f÷x\x1a(Ç" afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\7063c728 = "GŽ¸c\x15уKCߘ…|Ç—%\u00a0\x17|(\vþdÈNûíö¼Úü'€G\u0090G‰÷\x11wHÿ8¤‰çìä/xŸ‘‡8¬ïŸÀ\x0fœˆñ¬9¨ÐGÿ¼('ôÁW¼\fñt'\x0f<œ\tÏœŠ\x7fW\x17odÇ)Äd\x7f2ºß,·W7§Hô$)A§?ì×H\t”9T„ÿ¿<œ\x18œÈÜŠL\\Š4™wy’\x14™ÐàˆG\x0fÀÂL¿Ù·g¡„\x1aG'/\u0090œpT\x04—\x18¯¯Ê—ï?—\x1c‘gä¹d\u008fiߢ4øgIÏ1)Ì¡\bä?\x04W_Ї\u008f'Šhÿ\aZ˜B²\a\x0f”7\f9D¿ÔL\x0f\x04Äàù‡t/,¡Ü÷Ì\x1c_7x0w°Ê¤—ª\x17±÷ÜçW×Ìï4ß¿\x7f÷x\x1a(Ç" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe File opened for modification C:\Windows\apppatch\svchost.exe afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe 1644 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1644 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 85 PID 1848 wrote to memory of 1644 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 85 PID 1848 wrote to memory of 1644 1848 afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe"C:\Users\Admin\AppData\Local\Temp\afc6625d58225e668e7369871a5e5ab52232f2fec1e553ee668999c80482368c.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1644
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
24KB
MD561eb66e2d81babe0e1e1d9d5be5b6879
SHA136c3cba6b406ef7b7f8a5ef6c90c58ce98cc5eb9
SHA25658f35e98858b0cf2f3fc62962454defc886bb0a7cc56064fd3af421d329dbf6e
SHA51215eb340b6eb72beb6391fa867b3e0b34d468c67ba1b8563f245e903c8eb123b336e0f6125a9600dfa8e13285c3202e48c9dcf681a79bff539d1bb60875f940c7
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
203KB
MD593cdd755beec9f0d6cbc1e25fde6c850
SHA175ce098961e61ff327b256542cd5412aab0e3897
SHA256d54cc11634745d506fcc93520a101d71c872ef2d672fd5a2acb5269be9a6f124
SHA512170c2d45ea3f245f40d0a90a443ade7077bbaafdacd99a967ce4ddab945d33d0582264ec35e147354775b8792b011616817e162e9e19b6094b5019e8505b04a3