Analysis
-
max time kernel
120s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 08:37
Static task
static1
Behavioral task
behavioral1
Sample
da6a32eecd1e16f98756e915877797f0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
da6a32eecd1e16f98756e915877797f0N.exe
Resource
win10v2004-20240802-en
General
-
Target
da6a32eecd1e16f98756e915877797f0N.exe
-
Size
209KB
-
MD5
da6a32eecd1e16f98756e915877797f0
-
SHA1
04bc4f201dc8d323b639354ba0343a355c8c09fe
-
SHA256
1cf250e6d2cc9f234157f9ca6cbfb44069a662634a7aa9dfdf50808b6094e64c
-
SHA512
693cfd768f852a3942b9670179d100cc4b885555b1ef546bbbf6514f86b9480e181e90326356faf19c15f5a121256b01d9f410d49616c1545d45e8753a291f33
-
SSDEEP
3072:GQcjk9tVRNIcjb4Ryfjijjx14hdeCXHKPJFo9zpE7Di0X0JuLL+o7BlpF9e:GQh9tVRm2kh34hdeCkcG7DEALLlnN
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4052 svchost.exe -
resource yara_rule behavioral2/memory/4908-1-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/4908-13-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/4052-15-0x0000000000400000-0x0000000000469000-memory.dmp upx behavioral2/memory/4052-17-0x0000000000400000-0x0000000000469000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\894bada = "C:\\Windows\\apppatch\\svchost.exe" da6a32eecd1e16f98756e915877797f0N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\894bada = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe da6a32eecd1e16f98756e915877797f0N.exe File opened for modification C:\Windows\apppatch\svchost.exe da6a32eecd1e16f98756e915877797f0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language da6a32eecd1e16f98756e915877797f0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4052 svchost.exe 4052 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4908 da6a32eecd1e16f98756e915877797f0N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4908 wrote to memory of 4052 4908 da6a32eecd1e16f98756e915877797f0N.exe 90 PID 4908 wrote to memory of 4052 4908 da6a32eecd1e16f98756e915877797f0N.exe 90 PID 4908 wrote to memory of 4052 4908 da6a32eecd1e16f98756e915877797f0N.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\da6a32eecd1e16f98756e915877797f0N.exe"C:\Users\Admin\AppData\Local\Temp\da6a32eecd1e16f98756e915877797f0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4908 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4052
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4372,i,3239535018877284530,3457823197501312703,262144 --variations-seed-version --mojo-platform-channel-handle=3800 /prefetch:81⤵PID:1960
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
209KB
MD5b6bca181f88b3bfae38b54ea0b7e92a8
SHA1c00927f05ea650d12498503ad06c4726b6bfcb82
SHA256335f82645eb6e16ba7d85ac855305744e2200c50b907288cc6b6e8759c530cc6
SHA51242d744dee9112be42734ed8df48b65caa790972e819fe67ea89e560720b3cf249ede29973ad6334d9bb7dadff9dd5562bdfd667c6faddc512f9d3257f945042c