Analysis
-
max time kernel
150s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
20/09/2024, 01:57
Static task
static1
Behavioral task
behavioral1
Sample
fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe
Resource
win10v2004-20240802-en
General
-
Target
fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe
-
Size
156KB
-
MD5
6f322f479f59054e175da2aa55a8cb4b
-
SHA1
5f8cbfcf30296a8a37686710ebab2a9cd709846f
-
SHA256
fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df
-
SHA512
8542de14a0180f32260d6df7ffbab3ee0b68e78a4664f422e3ae2ff16d4b2aefa0bec7f10e07a10da521ca76e2a774237121404d17cf24b0ba7265d6441495b7
-
SSDEEP
3072:ikvM+OOUYjo0i2JdvIArAVMBWfvgfJYraeL/qHQl:RM+Fo2JxeMw3g42HQl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3480 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e23407ed = "C:\\Windows\\apppatch\\svchost.exe" fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\e23407ed = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe File opened for modification C:\Windows\apppatch\svchost.exe fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe 3480 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4400 fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4400 wrote to memory of 3480 4400 fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe 82 PID 4400 wrote to memory of 3480 4400 fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe 82 PID 4400 wrote to memory of 3480 4400 fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe"C:\Users\Admin\AppData\Local\Temp\fe54dcf5c42f531faa664199ef6bd107a731d84e89394dedf05ccd927128f7df.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3480
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
156KB
MD59263eb7e6896fc32e297c63bf6586936
SHA14f0c9516859d33eab1ad3c32152c51cb319f4495
SHA25641e752879761cdd14c3822122f132be62b89cb36891a3484941ab5d3ad18f44b
SHA512cec921212db8240c87f3df12700caf1140916a7ec7c416640b27621bb09b14df18023107e32f3141c7b51a07578afdb72f9e22dcff4a80133979379560de3e79