Analysis
-
max time kernel
146s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
18/08/2024, 18:39
Static task
static1
Behavioral task
behavioral1
Sample
0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe
Resource
win10v2004-20240802-en
General
-
Target
0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe
-
Size
212KB
-
MD5
fea5fd15a98ac955446d7360df6ae088
-
SHA1
efb45417fea51f5113246d7860f2f755c3c282ee
-
SHA256
0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b
-
SHA512
e229f46dcea674ba25fcd0ccb62e7c22f14dbfd3592a9aad47273703a1a7801a61c12f46a0a8cfa6f2b2bf063b4bcf50ace57f375aaca3e9b317d5bdae05f11c
-
SSDEEP
3072:XGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:XG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4148 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\abcf90e = "DYŽ¨~\x0f0DÑdM6‘°°kˆ\u008dÛTD:|ªîO\x16Ñ\x16Ý°”B\x18\x15\"ª\x13wç\x1ey\x04¥\"\b\x01Å\rÔq\b©ºw\x1e\x18\x04cŠ§57\x05U#jð\x11 øïñtù}t…\"ï8ít[ŠòŸÂtƒ\x13ø~³º7Bî>+\u0081´oçYÿñL\x18\x18\x19scö[”f¸\x13cGÕ\u009d8îY,Â)ù{¦”5#@\"P[‹\x04P\x01†îË~ÒK\aÅyž#PÂf^\x11~ÕÒÊi~çK»ç'cÜtù$\x111¨*¨*BÀ´¦ŠliPŠRòo@øÔ_íÀüÀ³É\x15\x7f½,‘MUqïOb\r§c\x19\x19Ô~ö®\u009dä\u008fé\f°,Fˆ¸\nÜÕƒ\u009d\x01öR=ŠòÉ\r”Ð\x1fÿKBÙø\x05\x045–í±" 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\abcf90e = "DYŽ¨~\x0f0DÑdM6‘°°kˆ\u008dÛTD:|ªîO\x16Ñ\x16Ý°”B\x18\x15\"ª\x13wç\x1ey\x04¥\"\b\x01Å\rÔq\b©ºw\x1e\x18\x04cŠ§57\x05U#jð\x11 øïñtù}t…\"ï8ít[ŠòŸÂtƒ\x13ø~³º7Bî>+\u0081´oçYÿñL\x18\x18\x19scö[”f¸\x13cGÕ\u009d8îY,Â)ù{¦”5#@\"P[‹\x04P\x01†îË~ÒK\aÅyž#PÂf^\x11~ÕÒÊi~çK»ç'cÜtù$\x111¨*¨*BÀ´¦ŠliPŠRòo@øÔ_íÀüÀ³É\x15\x7f½,‘MUqïOb\r§c\x19\x19Ô~ö®\u009dä\u008fé\f°,Fˆ¸\nÜÕƒ\u009d\x01öR=ŠòÉ\r”Ð\x1fÿKBÙø\x05\x045–í±" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe File created C:\Windows\apppatch\svchost.exe 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe 4148 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1468 wrote to memory of 4148 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 86 PID 1468 wrote to memory of 4148 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 86 PID 1468 wrote to memory of 4148 1468 0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe"C:\Users\Admin\AppData\Local\Temp\0da7646a083f1c1f6715c445c843d15a24f69a37bf026a0f9e73afb1189b0e5b.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4148
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
41KB
MD50213896cdc220cf0ed88a3587281a4fa
SHA184d27ddb2518600cbe103b16f3e04c630df99ff2
SHA25621117c289cdda00fd98d415af824d21ac3cc9b1021773ee28fea2dccce8f0eaf
SHA512f6124d85988bfbf3997ae2b5ba340a0efeb0693c03f85763b62ea724b833ba816317d5f143f085dc30ec3d91b5a8d33a6924b62b14840c982a67d8f72d044bae
-
Filesize
593B
MD53b03d93d3487806337b5c6443ce7a62d
SHA193a7a790bb6348606cbdaf5daeaaf4ea8cf731d0
SHA2567392749832c70fcfc2d440d7afc2f880000dd564930d95d634eb1199fa15de30
SHA512770977beaeedafc5c98d0c32edc8c6c850f05e9f363bc9997fa73991646b02e5d40ceed0017b06caeab0db86423844bc4b0a9f0df2d8239230e423a7bfbd4a88
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
24KB
MD57d0c47fae44e917bf712e971d0d00f1d
SHA1a34fe5e4ff91d6f8dc14cf37c06249569c8d53b5
SHA2569c90fee503882871d730985289cc44d1d072993171db3389e1e2a4c216f5fc06
SHA512153b0530b679f29cefe46e6db9c1722306e04277aa3329855e7ed781836bc0ac8802ce58ebb41b8a2a9c05a4df5918e14ffe9080b29d645d6a9dd578f4ce3ce0
-
Filesize
212KB
MD5f02464b414792538a48662144b5a0d80
SHA141a4d9b4f97003cdbca9127fb85569b31eac2790
SHA2564a8d8375ba8fb862cc2de39873bd8fbe97cb84ebdb2878d4084ab9cbf515d728
SHA51290f93c56b172e8614d88acdf9ebafb915c997f485b5aaa67d2787b6611f530b4697d64a218c7d9628b637a10c339e6b43cee93f5ec00e34a4576e20d56f7a232