Analysis
-
max time kernel
120s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27/09/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
Resource
win10v2004-20240802-en
General
-
Target
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
-
Size
157KB
-
MD5
a579bbe96e4a3e15653ab02e60927e70
-
SHA1
4be1539006aca580caa09a546f13eb0e10a8ecc0
-
SHA256
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8
-
SHA512
6336e650cba92b11251a4ee393ba825695cfe7a1009dfaef93eb79046f19a5c5c6c483abb005a2264eb4a627482d3aea1559ebf464a89746b3c602a9f666f257
-
SSDEEP
3072:teVsjyYsAq/C3RCzgJHvNA1PpYfFL6zU+BEfi:4OjjqahUSPe1SZ+h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2116 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1d33d8e8 = "C:\\Windows\\apppatch\\svchost.exe" 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\1d33d8e8 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe File opened for modification C:\Windows\apppatch\svchost.exe 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe 2116 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 3020 wrote to memory of 2116 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 30 PID 3020 wrote to memory of 2116 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 30 PID 3020 wrote to memory of 2116 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 30 PID 3020 wrote to memory of 2116 3020 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe"C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2116
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD5a9e031e490a7a42a0e9c037eabda380e
SHA1b3fed14cf5482fc149b95a5fe1b2d827e3e88462
SHA2568dbe6f146162efcf7ca31bdc52e01d567156155f14d3096d23da97947791b44c
SHA5121064c6d5f823c75c3eb26a9b060023e3b2c7482381ae0743ce3d58b86674a10ae99bb8350caa6e1a7b43ace8c1f3174f06539b9637e6dd48e795b0312d374cb2