Analysis
-
max time kernel
116s -
max time network
120s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 04:21
Static task
static1
Behavioral task
behavioral1
Sample
2ab53c7723292f6e8c86ca6647961d40N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
2ab53c7723292f6e8c86ca6647961d40N.exe
Resource
win10v2004-20240802-en
General
-
Target
2ab53c7723292f6e8c86ca6647961d40N.exe
-
Size
204KB
-
MD5
2ab53c7723292f6e8c86ca6647961d40
-
SHA1
c84a196ea4296dbee6857af9e68d6fda8accbe25
-
SHA256
33024a260ea95ec87fc4911f251d181efcaf4adf88579ee27f8f4a9e4ef0023c
-
SHA512
0eed8c4b00581ed547510bcdd4c5d2a5e6701f4242546799533428bf57b38b77226a0b73208605f5a9c64418a02f419afc3bda06587a04b56d6bb2a936f553db
-
SSDEEP
3072:C5u7yT4TVbkuRaX1w71jnRkCoyJTarYWbV+HOFxg+z1WxJsqWkoyjOowUVl/TlAQ:CLexkuRaX41xoyJV65gzyZko+uc
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1352 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9f6502b7 = "Ãîƒ\tÏH|_ÛM0\x05ÖQNFzz°-t`B\x18\u008f*›è\x13v=|a‡OˆÆÄ\x16äÙ\x18Ä\x7f\x06n0\a¯¡ä\x0f8ôdoï\u0081\x1fĦé´|·¹D|wÉÔ/Á€O¼AÜqt&,Ì\f´d‰|¶Ñ\\~®ÖŸT\x04±Oæÿìé(\x10(ÏŽ‰?¤ìnæ´'(\x18g\x18Oaߟ°Œ¸Ï®tñvÔtÉ6Žü4,\x0fç\x1c\t\tÜIT¨\x1cÜtfçÇww”ÎÔ,^\x10žig×læ\fwç8lÔ\x0edÏ\\0\a/œÆgÁ|',œé¾€IW\x068œè9Ì$O,–ÿî 0ì\x06xALgŒfœ\x7fD\x17øn÷ßL$ì\x14ü—\at\x18ç\x0f¯@æüAœ" 2ab53c7723292f6e8c86ca6647961d40N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9f6502b7 = "Ãîƒ\tÏH|_ÛM0\x05ÖQNFzz°-t`B\x18\u008f*›è\x13v=|a‡OˆÆÄ\x16äÙ\x18Ä\x7f\x06n0\a¯¡ä\x0f8ôdoï\u0081\x1fĦé´|·¹D|wÉÔ/Á€O¼AÜqt&,Ì\f´d‰|¶Ñ\\~®ÖŸT\x04±Oæÿìé(\x10(ÏŽ‰?¤ìnæ´'(\x18g\x18Oaߟ°Œ¸Ï®tñvÔtÉ6Žü4,\x0fç\x1c\t\tÜIT¨\x1cÜtfçÇww”ÎÔ,^\x10žig×læ\fwç8lÔ\x0edÏ\\0\a/œÆgÁ|',œé¾€IW\x068œè9Ì$O,–ÿî 0ì\x06xALgŒfœ\x7fD\x17øn÷ßL$ì\x14ü—\at\x18ç\x0f¯@æüAœ" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 2ab53c7723292f6e8c86ca6647961d40N.exe File opened for modification C:\Windows\apppatch\svchost.exe 2ab53c7723292f6e8c86ca6647961d40N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2ab53c7723292f6e8c86ca6647961d40N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe 1352 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3732 2ab53c7723292f6e8c86ca6647961d40N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3732 wrote to memory of 1352 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 93 PID 3732 wrote to memory of 1352 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 93 PID 3732 wrote to memory of 1352 3732 2ab53c7723292f6e8c86ca6647961d40N.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2ab53c7723292f6e8c86ca6647961d40N.exe"C:\Users\Admin\AppData\Local\Temp\2ab53c7723292f6e8c86ca6647961d40N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3732 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1352
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --field-trial-handle=4120,i,1729213506309163284,12809566808978835441,262144 --variations-seed-version --mojo-platform-channel-handle=4440 /prefetch:81⤵PID:4952
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
102KB
MD538fe9b7f10b4b07413521b16a94737c4
SHA190a15e446d9be28296af99f51113d3d72f4ca860
SHA256d973dc7c5aad21a35c9745695d56b3372e4134c6b690fc0c467cb62c144afa69
SHA512ce04fb0524138ba0e854c6792985ebaad91abd71799728bc3a723b9345a619ff87bb24139966ebbc9d824e8bacebabeba1d83e9704738d514879951952fe00de
-
Filesize
204KB
MD5d1a9d9aeca5a2aa8375a84d2e7d82780
SHA144da138015fee4061a013dd7bf78f5cc971df897
SHA2561ad5b7f5bc4d5ee3c2aac45b0dae5f7b9b0c6c012c9179a8ba45ec2dda293897
SHA5128964c286141a401b22b85939c0f71ec1ccf1fa46c53534730f60a08468a286b70c9d0daa56a21afb1154b9f4359ba9576e74078675558fb7990436c98b8790d4