Analysis
-
max time kernel
118s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
20/08/2024, 05:14
Static task
static1
Behavioral task
behavioral1
Sample
7ac532308a895b77eb3175c826e50c10N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
7ac532308a895b77eb3175c826e50c10N.exe
Resource
win10v2004-20240802-en
General
-
Target
7ac532308a895b77eb3175c826e50c10N.exe
-
Size
201KB
-
MD5
7ac532308a895b77eb3175c826e50c10
-
SHA1
6734e3383a055aafc4c008806753d560a57a6031
-
SHA256
b2528832b654328afe4884b89d15cd10f5b24f204497db9985b4a5f47880bf35
-
SHA512
a933136b233be1979528f7977bf9226060ee1685120cab622852727d38efb972638b67157347c6022921e51f76036fc0f0c9adc7fecfbd93d0794884d3b359bc
-
SSDEEP
6144:Mt++Jbojf5Vq5OC4qZhZcKYhc/ZfUozY:f+cff22qZhZcKYhc/
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2928 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2636 7ac532308a895b77eb3175c826e50c10N.exe 2636 7ac532308a895b77eb3175c826e50c10N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\65d54f31 = "C:\\Windows\\apppatch\\svchost.exe" 7ac532308a895b77eb3175c826e50c10N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\65d54f31 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 30 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lysyfyj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 7ac532308a895b77eb3175c826e50c10N.exe File opened for modification C:\Windows\apppatch\svchost.exe 7ac532308a895b77eb3175c826e50c10N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ac532308a895b77eb3175c826e50c10N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2928 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2636 7ac532308a895b77eb3175c826e50c10N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2636 wrote to memory of 2928 2636 7ac532308a895b77eb3175c826e50c10N.exe 30 PID 2636 wrote to memory of 2928 2636 7ac532308a895b77eb3175c826e50c10N.exe 30 PID 2636 wrote to memory of 2928 2636 7ac532308a895b77eb3175c826e50c10N.exe 30 PID 2636 wrote to memory of 2928 2636 7ac532308a895b77eb3175c826e50c10N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ac532308a895b77eb3175c826e50c10N.exe"C:\Users\Admin\AppData\Local\Temp\7ac532308a895b77eb3175c826e50c10N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2928
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
1KB
MD5a3d8302d4a5d1fe4c3845a909adcf870
SHA1ab5a254bf602ac36c218c20eef03d51737455182
SHA2560372a0d11052f01528693b61f43e52f6d51b8cf9bf2202ec2b57495b910f4934
SHA5124840251540ab5d9e1ae492e987009f8fd1201ddfeacebb06065b87ae787d164ed2dbe8a4e1f43829e503b513f4659fb617c220c278bb184cb039b30f0b6bdd03
-
Filesize
114B
MD5bfde1e9e9c32c1681a16139450c6909d
SHA17e669b927e6a75a10a0ca29e38e58ddcb49b725e
SHA256e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a
SHA512781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\WK27LCMU\login[3].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
201KB
MD5cd317628462ff54d75d197d7a8ffc827
SHA10e55169ef846a30b5e067b18d84e6c5b76117373
SHA256f3ed79bebf0c316060fcdbd33ec56afd121a07e6b47623a9c7406885701e9cd1
SHA512cb244773e278603fb2a8e499c500718bbf01316403717ab96e36c799626830c33e80939b1c72dc9bb47fb0d2bdf12bba92852184f1314de61e9d66e9bdd4c34e