Analysis
-
max time kernel
144s -
max time network
158s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
24-08-2024 20:21
Static task
static1
Behavioral task
behavioral1
Sample
233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe
Resource
win10v2004-20240802-en
General
-
Target
233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe
-
Size
356KB
-
MD5
c6bf8dce10c797281105f773d87befd9
-
SHA1
b1c30f800c4b122b380e30f72e3eb4b8814f23a5
-
SHA256
233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177
-
SHA512
a30b28731f3a265e95e211374c27c629ce591636cf8f765e1aa1f4684d69130e9c5365bb2bcc026e4a79a8f07db90804a2673e0d656c4a215205a16a1f6ae274
-
SSDEEP
6144:p3EmWPDNND9yRPzLq+YXFqaZiMLic9kzVd7EAC4TSs9Ei:+mWhND9yJz+b1FcMLmp2ATTSsd
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2144 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c94186a5 = "áIŸ\x142q¯Ôáä\u00a0\x0e\x10Cb*:»\x7fwÐAð»1\x04®©\x1dûIÒj¢\\‡.Çs¯0¨?˃\x16W ;p|wÞvÔ\fKœŽ'^ $\x0eîHÊs#öC\fjd·\nWÓp_or¢ŸâokËÆ\x06þ’OŸÚˆ˜ÿvÎgïº\\zºrºØøª·œ\u008f€›\x1aØÈT/.öƒ×LŽ¢ÀãŠ\x17è³2:22«\x1bð×\x02ª¸ð´úϨ0d>r·£çD\x13jV¢\u0090Ÿsòl;:ÌR¿Ç„CêÈc\x03B×\x03(t\x13;Ꚙ\x1bð#jc³×šØßò˜êR023»0ËÔš+›ª2ÏÖc`®VB³[\x1fSú{ShÛ\nÃ" 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\c94186a5 = "áIŸ\x142q¯Ôáä\u00a0\x0e\x10Cb*:»\x7fwÐAð»1\x04®©\x1dûIÒj¢\\‡.Çs¯0¨?˃\x16W ;p|wÞvÔ\fKœŽ'^ $\x0eîHÊs#öC\fjd·\nWÓp_or¢ŸâokËÆ\x06þ’OŸÚˆ˜ÿvÎgïº\\zºrºØøª·œ\u008f€›\x1aØÈT/.öƒ×LŽ¢ÀãŠ\x17è³2:22«\x1bð×\x02ª¸ð´úϨ0d>r·£çD\x13jV¢\u0090Ÿsòl;:ÌR¿Ç„CêÈc\x03B×\x03(t\x13;Ꚙ\x1bð#jc³×šØßò˜êR023»0ËÔš+›ª2ÏÖc`®VB³[\x1fSú{ShÛ\nÃ" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe File opened for modification C:\Windows\apppatch\svchost.exe 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe 2144 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3368 wrote to memory of 2144 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 84 PID 3368 wrote to memory of 2144 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 84 PID 3368 wrote to memory of 2144 3368 233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe"C:\Users\Admin\AppData\Local\Temp\233842fc1f0e03f3d87afcf8628674d51013cdc24fbdda9e800ad332db3ad177.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3368 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2144
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
41KB
MD54a308246a391f9f2327f92033f3c62ff
SHA1c4ca975c7b0ec657acc7039b60f1ae286fe0f483
SHA256752244dec96d9fc04eba2fd502a6ee8445646783bb2b8cb6f682b1b4c39fee62
SHA5129327420dc1eb3c64767a7d58e651dca54f62d54084d81835381b4b77e179ff0f950e1d40a5f2aece293b102e42a37a7d875969da7cd28462a7ec94b564970b2c
-
Filesize
356KB
MD5416bf4a563d439486734af67e0f08887
SHA1d5ced59db2d1720507d8569a3467ae797988c53a
SHA256f37431b935f038900adf6329138bde403d25c53eb17a305e9a7f8dbac738673f
SHA512e41f1dfb298cc96bf4129f207e32e05d18eb41b76454c0f9ee7659f2f2e526aa24cb201d964b0f46ef05c4c4cefe36087142bbe32da54364ea380f5f2f044b8f