Analysis
-
max time kernel
16s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20-09-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe
Resource
win10v2004-20240802-en
General
-
Target
b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe
-
Size
349KB
-
MD5
c4cb5c39de0044aa65fb2b3ea8263431
-
SHA1
0588d5b102526548095bf27645fc263161bce6e0
-
SHA256
b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782
-
SHA512
c84f27e86b82b2a19951ae58add524665131e5b93bff1402a7c477bbf314a2c2b3b63256d5b41cb54d15e318ce3f9b82a86f3a2b9543b7b9a8ed1a9db0cf0785
-
SSDEEP
6144:EVTQbSiexKAK4y6UvcZSeNH49qQQOH+ym4LLIoTqHSMaxzL:bSiOK4yjNQOGzoTCSMG
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 3048 svchost.exe -
Loads dropped DLL 5 IoCs
pid Process 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe 2176 WerFault.exe 2176 WerFault.exe 2176 WerFault.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\33a5fcac = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\33a5fcac = "C:\\Windows\\apppatch\\svchost.exe" b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe File created C:\Windows\apppatch\svchost.exe b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2176 3048 WerFault.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 3048 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2096 wrote to memory of 3048 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe 31 PID 2096 wrote to memory of 3048 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe 31 PID 2096 wrote to memory of 3048 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe 31 PID 2096 wrote to memory of 3048 2096 b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe 31 PID 3048 wrote to memory of 2176 3048 svchost.exe 32 PID 3048 wrote to memory of 2176 3048 svchost.exe 32 PID 3048 wrote to memory of 2176 3048 svchost.exe 32 PID 3048 wrote to memory of 2176 3048 svchost.exe 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe"C:\Users\Admin\AppData\Local\Temp\b595e9f4106b2f7ef8c9af5e5110659e236d3d81266283f62dc25c3eb7bc6782.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2096 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 4843⤵
- Loads dropped DLL
- Program crash
PID:2176
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
349KB
MD5c8cacb4074ef1a8c7bdae831d6786476
SHA1b5c33ab974099b081e548ce5ac25cbc67ce80d5a
SHA25645f05e57117d8d2f9f08cdab517b88d471e8657c2f183d309843907509453ad4
SHA512c74ea879a43574a9fc3eafa6ea825e9b00d401f19d1531eb43b03df31b5f2beb2860349ec2790b942ddc97bcf27f4be727be9683665b6dd2778af8e96efe40b6