Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
02/09/2024, 06:13
Static task
static1
Behavioral task
behavioral1
Sample
ac601a13bb7148975f50c577d32e4d60N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
ac601a13bb7148975f50c577d32e4d60N.exe
Resource
win10v2004-20240802-en
General
-
Target
ac601a13bb7148975f50c577d32e4d60N.exe
-
Size
1.1MB
-
MD5
ac601a13bb7148975f50c577d32e4d60
-
SHA1
d8376df25644b0172037abd55f7580d6595eeba0
-
SHA256
e7c664316d4a902e4fd8ad42837bcb13586296abdf22a1682f74b99dc883a59c
-
SHA512
6d9c67603b95e9f08236492833b065df45968f39ea518042563a695bbcdf2092e9ca95769058135cd363d22c43ab63c177ba25d735767f4d0c6457afa39bc027
-
SSDEEP
24576:E800kHPa2DfTNjx+mZCkt76f/24pN+XNqNG6hditW:b0riKf9Ckt7c20+9qNxUW
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2660 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2856 ac601a13bb7148975f50c577d32e4d60N.exe 2856 ac601a13bb7148975f50c577d32e4d60N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b79381ee = "C:\\Windows\\apppatch\\svchost.exe" ac601a13bb7148975f50c577d32e4d60N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\b79381ee = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 26 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qexyhuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galynuh.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\pupydeq.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vofycot.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\pupycag.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\gadyciz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lyxynyx.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyhyg.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe ac601a13bb7148975f50c577d32e4d60N.exe File created C:\Windows\apppatch\svchost.exe ac601a13bb7148975f50c577d32e4d60N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language ac601a13bb7148975f50c577d32e4d60N.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2660 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2856 ac601a13bb7148975f50c577d32e4d60N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2660 2856 ac601a13bb7148975f50c577d32e4d60N.exe 30 PID 2856 wrote to memory of 2660 2856 ac601a13bb7148975f50c577d32e4d60N.exe 30 PID 2856 wrote to memory of 2660 2856 ac601a13bb7148975f50c577d32e4d60N.exe 30 PID 2856 wrote to memory of 2660 2856 ac601a13bb7148975f50c577d32e4d60N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ac601a13bb7148975f50c577d32e4d60N.exe"C:\Users\Admin\AppData\Local\Temp\ac601a13bb7148975f50c577d32e4d60N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2660
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
593B
MD5926512864979bc27cf187f1de3f57aff
SHA1acdeb9d6187932613c7fa08eaf28f0cd8116f4b5
SHA256b3e893a653ec06c05ee90f2f6e98cc052a92f6616d7cca8c416420e178dcc73f
SHA512f6f9fd3ca9305bec879cfcd38e64111a18e65e30d25c49e9f2cd546cbab9b2dcd03eca81952f6b77c0eaab20192ef7bef0d8d434f6f371811929e75f8620633b
-
Filesize
114B
MD5bfde1e9e9c32c1681a16139450c6909d
SHA17e669b927e6a75a10a0ca29e38e58ddcb49b725e
SHA256e0d020ba1cb6506cee234903a44c747ee0cfa7e2d1e60029e4cd8de9a431512a
SHA512781fd54f155442dd34f9919b3cd063ee399db411bbfe15f2bdc43d3ab8ac2d04e1011b2c99fab42bebf7b903a94e09aaaef71b7a465d2d04b417f6dad8e8e396
-
Filesize
1.1MB
MD5874bf9b28373ae4f102292c1c881908a
SHA1c8719135c968fa0f8c6a0a348dea0b59c5ac52f2
SHA256fb363ac240676b6ba04884e3a2714a9db330f3bd34a0cf7b3cd855f44cedf022
SHA5123ce7882a74e777f2286840b6701db1413f857b12af3990d8566a39f42262546e0483ea16b97ea0d28410a97514b96e22d34d153bb9bec6fb26f59b4c984573a2