Analysis
-
max time kernel
117s -
max time network
117s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
26-08-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
5a9718b59b789af03134e62c87514bf0N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
5a9718b59b789af03134e62c87514bf0N.exe
Resource
win10v2004-20240802-en
General
-
Target
5a9718b59b789af03134e62c87514bf0N.exe
-
Size
217KB
-
MD5
5a9718b59b789af03134e62c87514bf0
-
SHA1
8b5a822bfd9d345bac7ee2e1cf02f3231fadaeb1
-
SHA256
51e5d607d6009973f6bd5445a81b57bb6f485b25eabf70f51d37f4c6da777864
-
SHA512
71dd8acc8865b3c01dff496a0ec3f5b2b938e6b64bb1a3fde39bbd51ce2aabfaf674c431a4ccfbb12a03b3d4cfcb3f4af31022cd74e4c57a6888fc8050496930
-
SSDEEP
6144:cnyiqVQBf0EaIp8fkTJJsK1eEzEB1XjrkXb:9Edp8csKpE7XX
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2348 svchost.exe -
Loads dropped DLL 6 IoCs
pid Process 1864 5a9718b59b789af03134e62c87514bf0N.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe 2112 WerFault.exe -
Modifies WinLogon 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\8c12ab40 = "C:\\Windows\\apppatch\\svchost.exe" 5a9718b59b789af03134e62c87514bf0N.exe -
Drops file in Program Files directory 16 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lygyvuj.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyhiz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gahyqah.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 5a9718b59b789af03134e62c87514bf0N.exe File opened for modification C:\Windows\apppatch\svchost.exe 5a9718b59b789af03134e62c87514bf0N.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2112 2348 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a9718b59b789af03134e62c87514bf0N.exe -
Modifies registry class 1 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3434294380-2554721341-1919518612-1000_CLASSES\Local Settings\MuiCache svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2348 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1864 5a9718b59b789af03134e62c87514bf0N.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeSecurityPrivilege 1864 5a9718b59b789af03134e62c87514bf0N.exe Token: SeSecurityPrivilege 1864 5a9718b59b789af03134e62c87514bf0N.exe Token: SeSecurityPrivilege 2348 svchost.exe Token: SeSecurityPrivilege 2348 svchost.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1864 wrote to memory of 2348 1864 5a9718b59b789af03134e62c87514bf0N.exe 30 PID 1864 wrote to memory of 2348 1864 5a9718b59b789af03134e62c87514bf0N.exe 30 PID 1864 wrote to memory of 2348 1864 5a9718b59b789af03134e62c87514bf0N.exe 30 PID 1864 wrote to memory of 2348 1864 5a9718b59b789af03134e62c87514bf0N.exe 30 PID 2348 wrote to memory of 2112 2348 svchost.exe 32 PID 2348 wrote to memory of 2112 2348 svchost.exe 32 PID 2348 wrote to memory of 2112 2348 svchost.exe 32 PID 2348 wrote to memory of 2112 2348 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a9718b59b789af03134e62c87514bf0N.exe"C:\Users\Admin\AppData\Local\Temp\5a9718b59b789af03134e62c87514bf0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2348 -s 29843⤵
- Loads dropped DLL
- Program crash
PID:2112
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\RV23TEDO\login[1].htm
Filesize168B
MD5d57e3a550060f85d44a175139ea23021
SHA12c5cb3428a322c9709a34d04dd86fe7628f8f0a6
SHA25643edf068d34276e8ade4113d4d7207de19fc98a2ae1c07298e593edae2a8774c
SHA5120364fe6a010fce7a3f4a6344c84468c64b20fd131f3160fc649db78f1075ba52d8a1c4496e50dbe27c357e01ee52e94cdcda8f7927cba28d5f2f45b9da690063
-
Filesize
217KB
MD500419685c6069c80f43de6db38c17958
SHA1325ed9cb6f508b33eb0f7b50590654d984f5acc3
SHA256c09cebc6196d94c73bc31dcd1629e9a937b6065c3c473b3dea42ba01cd3cef8d
SHA512ce0267ac57512c90cf66e26982fc7a6c2094ab2b4bf6de3ccb621d9b7c91b0500dec6c3f0bdc5ef440b03ca33d7cba834b4f5ab9c79ca8a1b6ed105d5ffda08b