Analysis
-
max time kernel
120s -
max time network
116s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
23/08/2024, 06:52
Static task
static1
Behavioral task
behavioral1
Sample
227224f511e1db571cc8874a54943ed0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
227224f511e1db571cc8874a54943ed0N.exe
Resource
win10v2004-20240802-en
General
-
Target
227224f511e1db571cc8874a54943ed0N.exe
-
Size
215KB
-
MD5
227224f511e1db571cc8874a54943ed0
-
SHA1
6255c394ce1df9643a8810742466eb14ee805a50
-
SHA256
e7ca69c9e2f591bf78bf75555156db1661df931478b815d0832578db20d1c52e
-
SHA512
822117be972767d8d990d3b9690423cd22b3399f945d0c3cd9a0884ae78afc8e7cb1fba4830eb54d6ba61792c19905f6390b1e720f03eac74fdb4d83058763e5
-
SSDEEP
3072:6oAbvJrZ/CEp1Td3INNAILgwKRpP3fJ2pwLAt/iw1JmWTe1eyfLUH+xW6Lyk:67vJN/CE/TZINiPPBIwcuWTegi9W
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4044 svchost.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1931697 = "C:\\Windows\\apppatch\\svchost.exe" 227224f511e1db571cc8874a54943ed0N.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gatyfus.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 227224f511e1db571cc8874a54943ed0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 227224f511e1db571cc8874a54943ed0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 227224f511e1db571cc8874a54943ed0N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-1302416131-1437503476-2806442725-1000_Classes\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe 4044 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4904 227224f511e1db571cc8874a54943ed0N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 4904 227224f511e1db571cc8874a54943ed0N.exe Token: SeSecurityPrivilege 4904 227224f511e1db571cc8874a54943ed0N.exe Token: SeSecurityPrivilege 4044 svchost.exe Token: SeSecurityPrivilege 4044 svchost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4904 wrote to memory of 4044 4904 227224f511e1db571cc8874a54943ed0N.exe 87 PID 4904 wrote to memory of 4044 4904 227224f511e1db571cc8874a54943ed0N.exe 87 PID 4904 wrote to memory of 4044 4904 227224f511e1db571cc8874a54943ed0N.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\227224f511e1db571cc8874a54943ed0N.exe"C:\Users\Admin\AppData\Local\Temp\227224f511e1db571cc8874a54943ed0N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4904 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
215KB
MD5adf359c45a608953476d90ad23ce7697
SHA19a3f78b27796119620de916eadaa23edfd3779b2
SHA256ac16d07d697470e5ed7a1bece04eb9ce1a72f68c7368f3b732098b4040cf8ae8
SHA512a743f7260d23e4f3f65eb13d09707478dd61896d4929c7ae6f4d70b87c954cde8e20182efb0a9c239ecfe72122c9389777411c8d85fee6d332ea26231b4e7b82