Analysis
-
max time kernel
111s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
17-08-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
5a875beafded7bc4e2bc201dc7d20bc0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a875beafded7bc4e2bc201dc7d20bc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5a875beafded7bc4e2bc201dc7d20bc0N.exe
-
Size
244KB
-
MD5
5a875beafded7bc4e2bc201dc7d20bc0
-
SHA1
5941d10d291c7c80b0d54d255a0e24d38aa2a7cd
-
SHA256
ccf74829e0681045497a49edba7a42b5c6b18147a5b3cad6a797cae363822581
-
SHA512
14a8e8a425eb254264bd65b19e4e74d7cb4571bebf70345e0cece519644ea636a7462362314cb46d00b089944c66eb9aa993cf5a9554064e1179b03c88750ebc
-
SSDEEP
6144:sEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:5Aylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2376 svchost.exe -
Loads dropped DLL 7 IoCs
pid Process 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe 2760 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ae531a6d = "C:\\Windows\\apppatch\\svchost.exe" 5a875beafded7bc4e2bc201dc7d20bc0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ae531a6d = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 5a875beafded7bc4e2bc201dc7d20bc0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 5a875beafded7bc4e2bc201dc7d20bc0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2760 2376 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a875beafded7bc4e2bc201dc7d20bc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2376 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2136 wrote to memory of 2376 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe 30 PID 2136 wrote to memory of 2376 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe 30 PID 2136 wrote to memory of 2376 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe 30 PID 2136 wrote to memory of 2376 2136 5a875beafded7bc4e2bc201dc7d20bc0N.exe 30 PID 2376 wrote to memory of 2760 2376 svchost.exe 31 PID 2376 wrote to memory of 2760 2376 svchost.exe 31 PID 2376 wrote to memory of 2760 2376 svchost.exe 31 PID 2376 wrote to memory of 2760 2376 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a875beafded7bc4e2bc201dc7d20bc0N.exe"C:\Users\Admin\AppData\Local\Temp\5a875beafded7bc4e2bc201dc7d20bc0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2376 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 3523⤵
- Loads dropped DLL
- Program crash
PID:2760
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD5fd8e0ba467bc8fff56a4dee4eccc876d
SHA1fd3343592a5c5e898e655542a0045e984ec159c8
SHA25653cba19903d0c029087005e30638174582d972f9e329a64cc1a0ea30e7dbbc3d
SHA512e184ffc2f62cbb08009fa1dd74352c15e2ed458398f977446eb583d88288edb4f1157e9329fc2bd62b0189efdd0eee48397c4f465bef46d3783b8f4fac3d64d4