Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
13-10-2024 22:37
Static task
static1
Behavioral task
behavioral1
Sample
0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe
Resource
win10v2004-20241007-en
General
-
Target
0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe
-
Size
149KB
-
MD5
a9e66ada276b6718fbe86f4a6a591240
-
SHA1
b3ad4ea56e030986e2eae3f203a43630ae135fba
-
SHA256
0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780
-
SHA512
6c333e24da51f884bf4cf79f1262c2a51caf5e19ff551ce5754be7664d68939ad6154bd2ac2801a6b7df759cd045089d1e6002028bf8d5c7cea3f3d7701531c9
-
SSDEEP
3072:okvr5pkOOUYjo0i2JdvIArAVMBWfvgfJYraeL/qHQl:rrHkFo2JxeMw3g42HQl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1776 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\75aebe2a = "C:\\Windows\\apppatch\\svchost.exe" 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\75aebe2a = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe File opened for modification C:\Windows\apppatch\svchost.exe 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe 1776 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2516 wrote to memory of 1776 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe 30 PID 2516 wrote to memory of 1776 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe 30 PID 2516 wrote to memory of 1776 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe 30 PID 2516 wrote to memory of 1776 2516 0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe"C:\Users\Admin\AppData\Local\Temp\0689528a9dadc93a793a408ca3753075922a1100f925129815f630b33533c780N.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:1776
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
149KB
MD553033215e3ce5356459d690eeb0f2d8e
SHA1e90c7d2dec0c6892ff60660dc7168d90ef391a5f
SHA256f397afa239aed750353b157203be548a5dadebe204025924e023641160f1c586
SHA51288bf2a1e4d8e6a84e80c1ff95f123bfcfd76a4c3f64caeb5bc01317644d9b2e5d9b3b6828d230a94808d993b872fd3e0fc54c4cfa0627f69a708f6865c5b3515