Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
01/09/2024, 13:52
Static task
static1
Behavioral task
behavioral1
Sample
ccaa91eaa5e531b11ac0d5c0346930e0N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
ccaa91eaa5e531b11ac0d5c0346930e0N.exe
Resource
win10v2004-20240802-en
General
-
Target
ccaa91eaa5e531b11ac0d5c0346930e0N.exe
-
Size
1.0MB
-
MD5
ccaa91eaa5e531b11ac0d5c0346930e0
-
SHA1
153fcdf462201b373cce67f35e186da54f78d79f
-
SHA256
8e93b2ed14737f958032c7e42ac08b53c999ef9943a96cd5461eb146927792bd
-
SHA512
7c29a7d4ed913e3c6857ebdf0cc6eed4bc5fe870bf8a0cbae8dedfd67d813a224f963a76c0a225453064387a438c1d3c1c7277961ba1fff0c593634016c9a843
-
SSDEEP
24576:mmUNJyJqb1FcMap2ATT5emUNJyJqb1FcMap2ATT5emUNJyJqb1FcMap2ATT58:mmV2ApemV2ApemV2Ap8
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1708 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e45472c8 = "H\u009dñÚ|õ—°ìþG\\¥\x0f\u00adÌ£¨\x1d\x0fp\x01\x0e³´Æ330\x05¸ƒ\x03¿co\u00ad\x17Ë—³³óí¯e\u00ad“{Û¥\u009dmíÝUݧGm]…»M#û\u00ad£Km‹WKÏ\u008dïõ—%£Ãe\r½\x05?¥\x1bm\x1f/'«O#u7UÍ…;û\u008d5;]Í\u008dõ3Ýåã\x15¥¯\r##Õûe…\u009d÷ëÍÅ·å/í\x15÷\x15Å\u008fMÅ?oíÃ5ƒ_¥Eï§\v%\x1fmͽSÓMÓÕ;-·S\x03\x05\x17_WMµU‹•\x15G¯‹Å\x15\x05\u00ad]3\x15Ý]E{¯\x03wM}ímÕm[oCo\x1duÍÝï/×ÇÅ\x15\u008d-ÿ݃Ýu3ÏÃ\u00ad½Çå¥%¥\x15Ï“_MGUwMµ#»\x1b…¥\aÕï_Ë“\rCESGS}Çý" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e45472c8 = "H\u009dñÚ|õ—°ìþG\\¥\x0f\u00adÌ£¨\x1d\x0fp\x01\x0e³´Æ330\x05¸ƒ\x03¿co\u00ad\x17Ë—³³óí¯e\u00ad“{Û¥\u009dmíÝUݧGm]…»M#û\u00ad£Km‹WKÏ\u008dïõ—%£Ãe\r½\x05?¥\x1bm\x1f/'«O#u7UÍ…;û\u008d5;]Í\u008dõ3Ýåã\x15¥¯\r##Õûe…\u009d÷ëÍÅ·å/í\x15÷\x15Å\u008fMÅ?oíÃ5ƒ_¥Eï§\v%\x1fmͽSÓMÓÕ;-·S\x03\x05\x17_WMµU‹•\x15G¯‹Å\x15\x05\u00ad]3\x15Ý]E{¯\x03wM}ímÕm[oCo\x1duÍÝï/×ÇÅ\x15\u008d-ÿ݃Ýu3ÏÃ\u00ad½Çå¥%¥\x15Ï“_MGUwMµ#»\x1b…¥\aÕï_Ë“\rCESGS}Çý" ccaa91eaa5e531b11ac0d5c0346930e0N.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe ccaa91eaa5e531b11ac0d5c0346930e0N.exe File created C:\Windows\apppatch\svchost.exe ccaa91eaa5e531b11ac0d5c0346930e0N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ccaa91eaa5e531b11ac0d5c0346930e0N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe 1708 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1700 wrote to memory of 1708 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 30 PID 1700 wrote to memory of 1708 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 30 PID 1700 wrote to memory of 1708 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 30 PID 1700 wrote to memory of 1708 1700 ccaa91eaa5e531b11ac0d5c0346930e0N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ccaa91eaa5e531b11ac0d5c0346930e0N.exe"C:\Users\Admin\AppData\Local\Temp\ccaa91eaa5e531b11ac0d5c0346930e0N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1700 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
1.0MB
MD5beb6a93bc2d747f5a3ae858f07247ee5
SHA1579370c42ddd67b3c0aaa533023e04f74f622f14
SHA25618d50cfa5e65c7d240ddbf269ba93ef7823ee2c4ed955587d95b87d9622446bf
SHA512361a54a67bb0b61021dedd0772a502134a50a1b8248c5760aba96cf9df4a934ab9a4c069790d516978e1aa5220bba833a730d0531ce3e90a16c77683f37e5abd