Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 21:47
Static task
static1
Behavioral task
behavioral1
Sample
10da48e7bfd4a3bf1454fe66f6ee1390N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
10da48e7bfd4a3bf1454fe66f6ee1390N.exe
Resource
win10v2004-20240802-en
General
-
Target
10da48e7bfd4a3bf1454fe66f6ee1390N.exe
-
Size
212KB
-
MD5
10da48e7bfd4a3bf1454fe66f6ee1390
-
SHA1
f97bdd16b72255785f2fa77a676412c1423df44a
-
SHA256
23dde3cd4d1e5c2fa6c95f85063789ab1ad85cb4bd241c908b40372350b7deec
-
SHA512
5e5b05a6b705315e85065f4b8641e9fb6362aafef3c2f2c289bd3be8e288018c2eca2cf8275f1de9ac6bb92e7c0d046dcfab3a88fd3302cf9c60a62367310004
-
SSDEEP
3072:nGwPsm1VrwxOsf0juzv8j4P1Hr6krr4IEhx9QZe2gO9mG9UHA30Vt3E/vDjb:nG/iVkO20SFgBhxtW9mG9+Umt3Ezjb
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2240 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d664cef1 = "\x1b\u009d£—ç" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\d664cef1 = "\x1b\u009d£—ç" 10da48e7bfd4a3bf1454fe66f6ee1390N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 10da48e7bfd4a3bf1454fe66f6ee1390N.exe File opened for modification C:\Windows\apppatch\svchost.exe 10da48e7bfd4a3bf1454fe66f6ee1390N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 10da48e7bfd4a3bf1454fe66f6ee1390N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1208 wrote to memory of 2240 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 31 PID 1208 wrote to memory of 2240 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 31 PID 1208 wrote to memory of 2240 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 31 PID 1208 wrote to memory of 2240 1208 10da48e7bfd4a3bf1454fe66f6ee1390N.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\10da48e7bfd4a3bf1454fe66f6ee1390N.exe"C:\Users\Admin\AppData\Local\Temp\10da48e7bfd4a3bf1454fe66f6ee1390N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2240
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
212KB
MD5cf63e2ac39814d131621abcbb307fa0c
SHA14d66e52ee91b9bb93905d3621436876bda043b13
SHA256c113e69e925631f001de85e989151d92a837a5b4bc3aa152183b693f0ee928e7
SHA512b9a3033568066496ee37e8b3d519f8c441fc9045bb4021121ce276f4891a1faee8629cb02beccf2048345d713ad4ffff5fee400ec3db196a1f0c4b2c43581de1