Analysis
-
max time kernel
115s -
max time network
96s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2024, 06:30
Static task
static1
Behavioral task
behavioral1
Sample
f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe
Resource
win10v2004-20241007-en
General
-
Target
f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe
-
Size
79KB
-
MD5
2b9b86ecb99dfc25bca984f28c3d8560
-
SHA1
c13399b10add82716c866fc33d95f951b1a4f4df
-
SHA256
f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7a
-
SHA512
cd491c6a59d8e2c45a9cad22c6bfe509ab6996e95dcbb629c520a4a76d787c466c2e2ec310b83fe6f0d8c4af90d5a4953af4d52865fec755512fbb58dd8203ea
-
SSDEEP
1536:AJiiNJ/EgCSAqtl/+RSBl9b74VHiv3rBCv5RmPq:AJiOcg9AqtCSBf34gv3rBCxkPq
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows/system32/SVCH0ST.EXE" f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Disables RegEdit via registry modification 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\DisableRegistryTools = "1" f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Disables Task Manager via registry modification
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Agent = "C:\\Windows\\System32\\SVCH0ST.EXE" f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SVCH0ST.EXE f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\dllhost.com f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe File opened for modification C:\Windows\system\dllhost.com f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe 2616 f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe"C:\Users\Admin\AppData\Local\Temp\f3d3e919b24a57b1f1406cdd5eede37859f72bcd82685eac5aa0e822567dae7aN.exe"1⤵
- Modifies WinLogon for persistence
- Disables RegEdit via registry modification
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2616
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
78KB
MD5a1d0d7d9f5367361dbbc170f100e45e6
SHA13c872b262e755e06f1e5314e809669b8a4d10714
SHA256c4df09a298307ccbe7235b03e02a134eaf3edc31773645bf3f1aa96fde0f5d2f
SHA51204c8e999fc2080500de24f7b8d2b371d3c1938ee01cb82045a2f43fcd2973e3ae07b2c05c9e7a54f1b016209ec478d592c23670957444e90f2837a7a72aebc00