Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
29/09/2024, 23:48
Static task
static1
Behavioral task
behavioral1
Sample
8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe
Resource
win10v2004-20240802-en
General
-
Target
8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe
-
Size
237KB
-
MD5
761a61a48968756a16fe28f44ac2cf9e
-
SHA1
b489a111da5a02591823aa1530f28a41b6147c30
-
SHA256
8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c
-
SHA512
85fee1d9474bb742159a8e243b6ada740854c19a24411b695961d772280455e5ab67fbe3a91891805dda289f344d7551f2f1ce6bd6176b8b97d1c21d47d99e08
-
SSDEEP
6144:sD8okEvTyoZVOgd2QZiw5NLclL5orfQH:usjCF2QZiOU+4
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2416 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f4cf021c = "C:\\Windows\\apppatch\\svchost.exe" 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\f4cf021c = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\apppatch\svchost.exe 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe File created C:\Windows\apppatch\svchost.exe 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2416 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2360 wrote to memory of 2416 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe 30 PID 2360 wrote to memory of 2416 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe 30 PID 2360 wrote to memory of 2416 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe 30 PID 2360 wrote to memory of 2416 2360 8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe"C:\Users\Admin\AppData\Local\Temp\8c5b9692901214654c1398107f7f3e4dbeb248b6151309ed3b817fd27263ae7c.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2360 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2416
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
237KB
MD513387a1f0a390348d633cb1d21d770c7
SHA1c45de8f19d4d1b95bf33962e99892b2041a2a70c
SHA2563fb25c46e75c9edf577391cd67e9ae50d553485c7c871b340ab79be840fcccae
SHA512c3027fc346ddb4370058ac3990ccd47c22c7ffc4e5cddb4fffdebee776e3a0a3511b1bccd324035f07d64598832a95240a856f2b4466271489ce1f1ee96b6223