Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 06:39
Static task
static1
Behavioral task
behavioral1
Sample
b3f1eff4a12203b58b5d6d1b68611970N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b3f1eff4a12203b58b5d6d1b68611970N.exe
Resource
win10v2004-20240802-en
General
-
Target
b3f1eff4a12203b58b5d6d1b68611970N.exe
-
Size
204KB
-
MD5
b3f1eff4a12203b58b5d6d1b68611970
-
SHA1
d219449dc354616027a87513cbbd88854dcc2959
-
SHA256
bb2efb45eb3427a5be0d0b87eeea5648d18b9e6b514eb4dfc82b8f50f0719789
-
SHA512
3c0455ff41734f21fe3f01999ba8c71c7300b1fdcf5554560afe3cfbb481f617d13683738b26a9967d997a03588b06bb9c396fc9e41ce19dc113add4228c6925
-
SSDEEP
3072:6aSdR9c1/fuWL0AjMilpCOT+kICtApWFK1WHk25weLcKznxbQFFNj6QU:67oFuhAwM+kICeseWEEPznxbJ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2192 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b0e3385f = "C:\\Windows\\apppatch\\svchost.exe" b3f1eff4a12203b58b5d6d1b68611970N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b0e3385f = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe b3f1eff4a12203b58b5d6d1b68611970N.exe File opened for modification C:\Windows\apppatch\svchost.exe b3f1eff4a12203b58b5d6d1b68611970N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b3f1eff4a12203b58b5d6d1b68611970N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2192 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1236 wrote to memory of 2192 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe 31 PID 1236 wrote to memory of 2192 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe 31 PID 1236 wrote to memory of 2192 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe 31 PID 1236 wrote to memory of 2192 1236 b3f1eff4a12203b58b5d6d1b68611970N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\b3f1eff4a12203b58b5d6d1b68611970N.exe"C:\Users\Admin\AppData\Local\Temp\b3f1eff4a12203b58b5d6d1b68611970N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2192
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
114B
MD5bfde1e9e9c32c1681a16139450c6909d
SHA17e669b927e6a75a10a0ca29e38e58ddcb49b725e
SHA256e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a
SHA512781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396
-
Filesize
204KB
MD56198cd62b07a6e01a78e4d1e00a3b442
SHA14bd43f10b3ae1d018edf99e8869b02bad1ae3649
SHA2565cfecd4110e6e588dc602c39bcfb2d2eee7a1937dcdcd9d4e9eb790a59aab66f
SHA51260571837b4fd163433e6501098c949223ec6acd36030fe149c4edbf173321230078c8568c1e89a12713e3416f461fe8d8e8f149e89d63baf2c212af4e555b35a