Analysis
-
max time kernel
101s -
max time network
102s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23-08-2024 22:04
Static task
static1
Behavioral task
behavioral1
Sample
503d212b6795b4af9bc63a38e29e1340N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
503d212b6795b4af9bc63a38e29e1340N.exe
Resource
win10v2004-20240802-en
General
-
Target
503d212b6795b4af9bc63a38e29e1340N.exe
-
Size
349KB
-
MD5
503d212b6795b4af9bc63a38e29e1340
-
SHA1
42ab014e91de372cf47fe7129931490f17d242b4
-
SHA256
17f2c1ea90f7a90d08c5a3de34dbd08973daed2b8eeda65e7dc68cdb933b683f
-
SHA512
8eb9a1f3b4f8c9a4e8f44146e5e1eb8e7459cf1bf6f2e8d652e4225cf5d743c80ec23d5975f442631a5f65f15b8f1d729b9428b90f5771021e5496865571a88e
-
SSDEEP
6144:rVTQ+SiexKAK4y6UvcZSeNH49qQQOH+ym4LLIoTqHSMaxzL:xSiOK4yjNQOGzoTCSMG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 4836 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5b2b48ba = "C:\\Windows\\apppatch\\svchost.exe" 503d212b6795b4af9bc63a38e29e1340N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5b2b48ba = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 503d212b6795b4af9bc63a38e29e1340N.exe File opened for modification C:\Windows\apppatch\svchost.exe 503d212b6795b4af9bc63a38e29e1340N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1944 4836 WerFault.exe 84 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 503d212b6795b4af9bc63a38e29e1340N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4836 svchost.exe 4836 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2216 503d212b6795b4af9bc63a38e29e1340N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2216 wrote to memory of 4836 2216 503d212b6795b4af9bc63a38e29e1340N.exe 84 PID 2216 wrote to memory of 4836 2216 503d212b6795b4af9bc63a38e29e1340N.exe 84 PID 2216 wrote to memory of 4836 2216 503d212b6795b4af9bc63a38e29e1340N.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\503d212b6795b4af9bc63a38e29e1340N.exe"C:\Users\Admin\AppData\Local\Temp\503d212b6795b4af9bc63a38e29e1340N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2216 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:4836 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4836 -s 8163⤵
- Program crash
PID:1944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 4836 -ip 48361⤵PID:4604
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD5067ee30eb4600089b23a7e1cd5d97412
SHA17fabccc5feed386a145e336e480af85c82047222
SHA2565a6b01e6d597a6a16f89405f7562a5af57782606620501d72c30fdc66090b98b
SHA5129d8bcf2496288ce3ba4bc4aed2898f8aa6745b9e10e7ef350b7ca5a855bcf982d3d6128340bd9ce6e1d90a702b53775f4a24cd30ce5ac7631505f6756b72f967