Analysis
-
max time kernel
120s -
max time network
97s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27/09/2024, 17:39
Static task
static1
Behavioral task
behavioral1
Sample
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
Resource
win10v2004-20240802-en
General
-
Target
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe
-
Size
157KB
-
MD5
a579bbe96e4a3e15653ab02e60927e70
-
SHA1
4be1539006aca580caa09a546f13eb0e10a8ecc0
-
SHA256
3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8
-
SHA512
6336e650cba92b11251a4ee393ba825695cfe7a1009dfaef93eb79046f19a5c5c6c483abb005a2264eb4a627482d3aea1559ebf464a89746b3c602a9f666f257
-
SSDEEP
3072:teVsjyYsAq/C3RCzgJHvNA1PpYfFL6zU+BEfi:4OjjqahUSPe1SZ+h
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2876 svchost.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\45928007 = "C:\\Windows\\apppatch\\svchost.exe" 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\45928007 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe File opened for modification C:\Windows\apppatch\svchost.exe 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2876 svchost.exe 2876 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1064 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1064 wrote to memory of 2876 1064 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 82 PID 1064 wrote to memory of 2876 1064 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 82 PID 1064 wrote to memory of 2876 1064 3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe 82
Processes
-
C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe"C:\Users\Admin\AppData\Local\Temp\3468c695a5dd50a99393832613a7432f7d3171eab99d0154e7d2eb5dbc07b8e8N.exe"1⤵
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
157KB
MD575edae73df143ef783946bfe85370531
SHA175db9e661497084d32da0d215a8772e6d2e88ee1
SHA256f349ae1e7d57e159f57bf5fa6d7a10ed99866e1360b734a8289b788453512f18
SHA5120fc44f100cfc3a84e0a9977baec08f0adef725ea64fb22671cf9d4296ec0169d3e4806d1000e19895b7ceb19da4a4f2f1cabbf164df58e7bc70987eb819c0e5b