Analysis
-
max time kernel
109s -
max time network
110s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
17-08-2024 11:32
Static task
static1
Behavioral task
behavioral1
Sample
5a875beafded7bc4e2bc201dc7d20bc0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
5a875beafded7bc4e2bc201dc7d20bc0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5a875beafded7bc4e2bc201dc7d20bc0N.exe
-
Size
244KB
-
MD5
5a875beafded7bc4e2bc201dc7d20bc0
-
SHA1
5941d10d291c7c80b0d54d255a0e24d38aa2a7cd
-
SHA256
ccf74829e0681045497a49edba7a42b5c6b18147a5b3cad6a797cae363822581
-
SHA512
14a8e8a425eb254264bd65b19e4e74d7cb4571bebf70345e0cece519644ea636a7462362314cb46d00b089944c66eb9aa993cf5a9554064e1179b03c88750ebc
-
SSDEEP
6144:sEXlSylvFuWaS54hIAv/QhuA7HY8pPZ0FP6BzxM5EmX:5Aylvv5YRwh9HYd61xhmX
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3644 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f7d55aa8 = "C:\\Windows\\apppatch\\svchost.exe" 5a875beafded7bc4e2bc201dc7d20bc0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f7d55aa8 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 5a875beafded7bc4e2bc201dc7d20bc0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 5a875beafded7bc4e2bc201dc7d20bc0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4616 3644 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a875beafded7bc4e2bc201dc7d20bc0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 3644 svchost.exe 3644 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1524 5a875beafded7bc4e2bc201dc7d20bc0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1524 wrote to memory of 3644 1524 5a875beafded7bc4e2bc201dc7d20bc0N.exe 84 PID 1524 wrote to memory of 3644 1524 5a875beafded7bc4e2bc201dc7d20bc0N.exe 84 PID 1524 wrote to memory of 3644 1524 5a875beafded7bc4e2bc201dc7d20bc0N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a875beafded7bc4e2bc201dc7d20bc0N.exe"C:\Users\Admin\AppData\Local\Temp\5a875beafded7bc4e2bc201dc7d20bc0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3644 -s 8243⤵
- Program crash
PID:4616
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 3644 -ip 36441⤵PID:4180
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
244KB
MD54bba72f05b98706088d520261844109f
SHA1276c8c4b5be8ed36bb6987f7e287b5e0e2fedae8
SHA2566cb5b918492f7569a910d467af6738e8fccb58bea667d27db097e61bf6cbf3b5
SHA512d49d12a5e12d880971ec511ff781c7183941d3219f71bfa0cbbb5ab86b3e63ae0ae70763d8069d5fd3d0abc52d425e09c6fca81c013400dcfd1172fba5758f97