Malware Analysis Report

2025-08-11 08:16

Sample ID 241112-pep9masepb
Target 56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a
SHA256 56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a
Tags
discovery persistence
score
10/10

Table of Contents

Analysis Overview

MITRE ATT&CK

Enterprise Matrix V15

Analysis: static1

Detonation Overview

Signatures

Analysis: behavioral2

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis: behavioral1

Detonation Overview

Command Line

Signatures

Processes

Network

Files

Analysis Overview

score
10/10

SHA256

56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a

Threat Level: Known bad

The file 56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a was found to be: Known bad.

Malicious Activity Summary

discovery persistence

Modifies WinLogon for persistence

Executes dropped EXE

Loads dropped DLL

Modifies WinLogon

Drops file in Windows directory

System Location Discovery: System Language Discovery

Suspicious behavior: EnumeratesProcesses

Suspicious behavior: RenamesItself

Suspicious use of WriteProcessMemory

MITRE ATT&CK

Analysis: static1

Detonation Overview

Reported

2024-11-12 12:14

Signatures

N/A

Analysis: behavioral2

Detonation Overview

Submitted

2024-11-12 12:14

Reported

2024-11-12 12:17

Platform

win10v2004-20241007-en

Max time kernel

150s

Max time network

151s

Command Line

"C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," C:\Windows\apppatch\svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\apppatch\svchost.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\862a4998 = "C:\\Windows\\apppatch\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\862a4998 = "C:\\Windows\\apppatch\\svchost.exe" C:\Windows\apppatch\svchost.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\apppatch\svchost.exe C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A
File opened for modification C:\Windows\apppatch\svchost.exe C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\apppatch\svchost.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\apppatch\svchost.exe N/A
N/A N/A C:\Windows\apppatch\svchost.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe

"C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe"

C:\Windows\apppatch\svchost.exe

"C:\Windows\apppatch\svchost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 bloodguiltiness.com udp
US 15.197.130.221:80 bloodguiltiness.com tcp
GB 92.123.128.180:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 8.8.8.8:53 217.106.137.52.in-addr.arpa udp
US 8.8.8.8:53 221.130.197.15.in-addr.arpa udp
US 8.8.8.8:53 180.128.123.92.in-addr.arpa udp
US 8.8.8.8:53 68.159.190.20.in-addr.arpa udp
US 8.8.8.8:53 95.221.229.192.in-addr.arpa udp
US 8.8.8.8:53 209.205.72.20.in-addr.arpa udp
US 8.8.8.8:53 28.118.140.52.in-addr.arpa udp
US 8.8.8.8:53 50.23.12.20.in-addr.arpa udp
US 8.8.8.8:53 241.42.69.40.in-addr.arpa udp
US 8.8.8.8:53 98.117.19.2.in-addr.arpa udp
GB 92.123.128.180:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 8.8.8.8:53 172.214.232.199.in-addr.arpa udp
US 8.8.8.8:53 29.243.111.52.in-addr.arpa udp
GB 92.123.128.180:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
GB 92.123.128.180:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 8.8.8.8:53 28.173.189.20.in-addr.arpa udp

Files

memory/1996-0-0x0000000002200000-0x0000000002267000-memory.dmp

memory/1996-1-0x0000000000400000-0x000000000046A000-memory.dmp

C:\Windows\apppatch\svchost.exe

MD5 f2ec69d5820b6a8643a6c6cd84ef44ef
SHA1 9ec1e9ee625cac561bab6c3014f181207a6581cf
SHA256 2087c53867ff64fd4bdd0c7e4e47044f62e3f22d86393ca0cdf99e2c7df43d08
SHA512 b244c2cd313d2014a0142668d0e16bf70c0f7da598275a130d8e7373fc94354d1560d0ed8d6a5ba1d185485d2c95ab149fb4188c2cb5d89c4432b1796ccb69e4

memory/3320-14-0x0000000000400000-0x000000000046A000-memory.dmp

memory/1996-13-0x0000000000400000-0x000000000046A000-memory.dmp

memory/1996-12-0x0000000002200000-0x0000000002267000-memory.dmp

memory/3320-16-0x0000000000400000-0x000000000046A000-memory.dmp

memory/3320-15-0x0000000002B70000-0x0000000002C00000-memory.dmp

memory/3320-17-0x0000000002F40000-0x0000000002FDF000-memory.dmp

memory/3320-22-0x0000000002F40000-0x0000000002FDF000-memory.dmp

memory/3320-19-0x0000000002F40000-0x0000000002FDF000-memory.dmp

memory/3320-28-0x0000000002F40000-0x0000000002FDF000-memory.dmp

memory/3320-57-0x0000000002F40000-0x0000000002FDF000-memory.dmp

memory/3320-56-0x00000000025E0000-0x00000000025E1000-memory.dmp

memory/3320-54-0x00000000025C0000-0x00000000025C1000-memory.dmp

memory/3320-53-0x00000000025D0000-0x00000000025D1000-memory.dmp

memory/3320-49-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/3320-47-0x0000000002590000-0x0000000002591000-memory.dmp

memory/3320-46-0x00000000025A0000-0x00000000025A1000-memory.dmp

memory/3320-43-0x0000000002590000-0x0000000002591000-memory.dmp

memory/3320-42-0x0000000002580000-0x0000000002581000-memory.dmp

memory/3320-40-0x0000000002560000-0x0000000002561000-memory.dmp

memory/3320-39-0x0000000002570000-0x0000000002571000-memory.dmp

memory/3320-36-0x0000000002560000-0x0000000002561000-memory.dmp

memory/3320-35-0x0000000002550000-0x0000000002551000-memory.dmp

memory/3320-33-0x0000000002530000-0x0000000002531000-memory.dmp

memory/3320-32-0x0000000002540000-0x0000000002541000-memory.dmp

memory/3320-31-0x0000000002540000-0x0000000002541000-memory.dmp

memory/3320-29-0x0000000002530000-0x0000000002531000-memory.dmp

Analysis: behavioral1

Detonation Overview

Submitted

2024-11-12 12:14

Reported

2024-11-12 12:17

Platform

win7-20240729-en

Max time kernel

150s

Max time network

143s

Command Line

"C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe"

Signatures

Modifies WinLogon for persistence

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," C:\Windows\apppatch\svchost.exe N/A

Executes dropped EXE

Description Indicator Process Target
N/A N/A C:\Windows\apppatch\svchost.exe N/A

Modifies WinLogon

persistence
Description Indicator Process Target
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5ae4f1e1 = "C:\\Windows\\apppatch\\svchost.exe" C:\Windows\apppatch\svchost.exe N/A
Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5ae4f1e1 = "C:\\Windows\\apppatch\\svchost.exe" C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A

Drops file in Windows directory

Description Indicator Process Target
File created C:\Windows\apppatch\svchost.exe C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A
File opened for modification C:\Windows\apppatch\svchost.exe C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A

System Location Discovery: System Language Discovery

discovery
Description Indicator Process Target
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A
Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language C:\Windows\apppatch\svchost.exe N/A

Suspicious behavior: EnumeratesProcesses

Description Indicator Process Target
N/A N/A C:\Windows\apppatch\svchost.exe N/A

Suspicious behavior: RenamesItself

Description Indicator Process Target
N/A N/A C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe N/A

Processes

C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe

"C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe"

C:\Windows\apppatch\svchost.exe

"C:\Windows\apppatch\svchost.exe"

Network

Country Destination Domain Proto
US 8.8.8.8:53 bloodguiltiness.com udp
GB 92.123.128.134:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
GB 92.123.128.134:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
GB 92.123.128.134:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp
GB 92.123.128.134:80 www.bing.com tcp
US 15.197.130.221:80 bloodguiltiness.com tcp

Files

memory/2252-0-0x0000000000270000-0x00000000002D7000-memory.dmp

memory/2252-1-0x0000000000400000-0x000000000046A000-memory.dmp

C:\Windows\AppPatch\svchost.exe

MD5 89764bc23344d29c1b282d81fbb26233
SHA1 72a18a089edbecfa8532ded8b3e39bfff2d69b95
SHA256 afd233173612eee8229f64940b9338eb741d88f6b10bd624f0e1accbc07f15b9
SHA512 818d094d24e4424b1c0367833fa315cebc31802a18f41d02c009f6e7be3985ba226404d8133b8b844f053dbce2c5f1b68ff74f839cba956a91e3071136b2d05d

memory/2252-17-0x0000000000400000-0x000000000046A000-memory.dmp

memory/2252-16-0x0000000000270000-0x00000000002D7000-memory.dmp

memory/2532-26-0x0000000002360000-0x00000000023F0000-memory.dmp

memory/2532-28-0x0000000002360000-0x00000000023F0000-memory.dmp

memory/2532-29-0x0000000000400000-0x000000000046A000-memory.dmp

memory/2532-24-0x0000000002360000-0x00000000023F0000-memory.dmp

memory/2532-22-0x0000000002360000-0x00000000023F0000-memory.dmp

memory/2532-20-0x0000000002360000-0x00000000023F0000-memory.dmp

memory/2532-18-0x0000000002360000-0x00000000023F0000-memory.dmp

memory/2532-30-0x00000000024F0000-0x000000000258F000-memory.dmp

memory/2532-32-0x00000000024F0000-0x000000000258F000-memory.dmp

memory/2532-34-0x00000000024F0000-0x000000000258F000-memory.dmp

memory/2532-47-0x00000000024F0000-0x000000000258F000-memory.dmp

memory/2532-76-0x00000000024F0000-0x000000000258F000-memory.dmp

memory/2532-75-0x0000000003280000-0x0000000003281000-memory.dmp

memory/2532-73-0x00000000031E0000-0x00000000031E1000-memory.dmp

memory/2532-72-0x0000000003270000-0x0000000003271000-memory.dmp

memory/2532-68-0x00000000031D0000-0x00000000031D1000-memory.dmp

memory/2532-66-0x00000000026A0000-0x00000000026A1000-memory.dmp

memory/2532-65-0x00000000031C0000-0x00000000031C1000-memory.dmp

memory/2532-62-0x00000000026A0000-0x00000000026A1000-memory.dmp

memory/2532-61-0x0000000002690000-0x0000000002691000-memory.dmp

memory/2532-59-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/2532-58-0x0000000002680000-0x0000000002681000-memory.dmp

memory/2532-55-0x00000000025B0000-0x00000000025B1000-memory.dmp

memory/2532-54-0x00000000025A0000-0x00000000025A1000-memory.dmp

memory/2532-52-0x0000000002040000-0x0000000002041000-memory.dmp

memory/2532-51-0x0000000002590000-0x0000000002591000-memory.dmp

memory/2532-50-0x0000000002590000-0x0000000002591000-memory.dmp

memory/2532-48-0x0000000002040000-0x0000000002041000-memory.dmp