Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 19:32
Static task
static1
Behavioral task
behavioral1
Sample
3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe
Resource
win10v2004-20240802-en
General
-
Target
3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe
-
Size
350KB
-
MD5
fb0cc0909058659349180cfd92fe1323
-
SHA1
d8954e8c280db8466f1ffdf1977c389429258f0d
-
SHA256
3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16
-
SHA512
c319b557ee1fefdc9726e920ada272062e761fe885f69386f551155fbe96535f64710dc3fdcaead5cf7edbf0461c3cfa7e4531961aafbf975ab514d8484d9ae3
-
SSDEEP
6144:gVTQySiuxLxeHs/4UvcZSeNH4ikRo6S5W3v71TLnOxV8SyuiNu:2SiieHs/KeoHkzxOxqSyj
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2544 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe 2812 WerFault.exe 2812 WerFault.exe 2812 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ee672a76 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\ee672a76 = "C:\\Windows\\apppatch\\svchost.exe" 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe File opened for modification C:\Windows\apppatch\svchost.exe 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2812 2544 WerFault.exe 30 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2544 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2544 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe 30 PID 2888 wrote to memory of 2544 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe 30 PID 2888 wrote to memory of 2544 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe 30 PID 2888 wrote to memory of 2544 2888 3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe 30 PID 2544 wrote to memory of 2812 2544 svchost.exe 31 PID 2544 wrote to memory of 2812 2544 svchost.exe 31 PID 2544 wrote to memory of 2812 2544 svchost.exe 31 PID 2544 wrote to memory of 2812 2544 svchost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe"C:\Users\Admin\AppData\Local\Temp\3133774f81b2ebd58279cad69210295a9ad12e757d078dd2734e9c241f9e7a16.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2544 -s 4283⤵
- Loads dropped DLL
- Program crash
PID:2812
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD574da0f6359d8cd4a1325500f61bae319
SHA1cdc309bf4a0c77d0eae8c9cbb6d1d8de426f4460
SHA25644086bcbdad2a468467c0380f5b252217be8056f519b0f27220ceba81d0ecac9
SHA5123ceb772d651bfc5a793c6a6aa5a9aea8d4e811295a5a0d5a6605cb04da5326a32a6a3b915a3107ad6b0d134b3ee5d097b05a13558be5e6774bb12bb42a47e807