Analysis Overview
SHA256
56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a
Threat Level: Known bad
The file 56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a was found to be: Known bad.
Malicious Activity Summary
Modifies WinLogon for persistence
Executes dropped EXE
Loads dropped DLL
Modifies WinLogon
Drops file in Windows directory
System Location Discovery: System Language Discovery
Suspicious behavior: EnumeratesProcesses
Suspicious behavior: RenamesItself
Suspicious use of WriteProcessMemory
MITRE ATT&CK
Enterprise Matrix V15
Analysis: static1
Detonation Overview
Reported
2024-11-12 12:14
Signatures
Analysis: behavioral2
Detonation Overview
Submitted
2024-11-12 12:14
Reported
2024-11-12 12:17
Platform
win10v2004-20241007-en
Max time kernel
150s
Max time network
151s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," | C:\Windows\apppatch\svchost.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\apppatch\svchost.exe | N/A |
Modifies WinLogon
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\862a4998 = "C:\\Windows\\apppatch\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\862a4998 = "C:\\Windows\\apppatch\\svchost.exe" | C:\Windows\apppatch\svchost.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\apppatch\svchost.exe | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
| File opened for modification | C:\Windows\apppatch\svchost.exe | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\apppatch\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\apppatch\svchost.exe | N/A |
| N/A | N/A | C:\Windows\apppatch\svchost.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 1996 wrote to memory of 3320 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
| PID 1996 wrote to memory of 3320 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
| PID 1996 wrote to memory of 3320 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe
"C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe"
C:\Windows\apppatch\svchost.exe
"C:\Windows\apppatch\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bloodguiltiness.com | udp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| GB | 92.123.128.180:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 8.8.8.8:53 | 217.106.137.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 221.130.197.15.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 180.128.123.92.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 68.159.190.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 95.221.229.192.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 209.205.72.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 28.118.140.52.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 50.23.12.20.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 241.42.69.40.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 98.117.19.2.in-addr.arpa | udp |
| GB | 92.123.128.180:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 8.8.8.8:53 | 172.214.232.199.in-addr.arpa | udp |
| US | 8.8.8.8:53 | 29.243.111.52.in-addr.arpa | udp |
| GB | 92.123.128.180:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| GB | 92.123.128.180:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 8.8.8.8:53 | 28.173.189.20.in-addr.arpa | udp |
Files
memory/1996-0-0x0000000002200000-0x0000000002267000-memory.dmp
memory/1996-1-0x0000000000400000-0x000000000046A000-memory.dmp
C:\Windows\apppatch\svchost.exe
| MD5 | f2ec69d5820b6a8643a6c6cd84ef44ef |
| SHA1 | 9ec1e9ee625cac561bab6c3014f181207a6581cf |
| SHA256 | 2087c53867ff64fd4bdd0c7e4e47044f62e3f22d86393ca0cdf99e2c7df43d08 |
| SHA512 | b244c2cd313d2014a0142668d0e16bf70c0f7da598275a130d8e7373fc94354d1560d0ed8d6a5ba1d185485d2c95ab149fb4188c2cb5d89c4432b1796ccb69e4 |
memory/3320-14-0x0000000000400000-0x000000000046A000-memory.dmp
memory/1996-13-0x0000000000400000-0x000000000046A000-memory.dmp
memory/1996-12-0x0000000002200000-0x0000000002267000-memory.dmp
memory/3320-16-0x0000000000400000-0x000000000046A000-memory.dmp
memory/3320-15-0x0000000002B70000-0x0000000002C00000-memory.dmp
memory/3320-17-0x0000000002F40000-0x0000000002FDF000-memory.dmp
memory/3320-22-0x0000000002F40000-0x0000000002FDF000-memory.dmp
memory/3320-19-0x0000000002F40000-0x0000000002FDF000-memory.dmp
memory/3320-28-0x0000000002F40000-0x0000000002FDF000-memory.dmp
memory/3320-57-0x0000000002F40000-0x0000000002FDF000-memory.dmp
memory/3320-56-0x00000000025E0000-0x00000000025E1000-memory.dmp
memory/3320-54-0x00000000025C0000-0x00000000025C1000-memory.dmp
memory/3320-53-0x00000000025D0000-0x00000000025D1000-memory.dmp
memory/3320-49-0x00000000025B0000-0x00000000025B1000-memory.dmp
memory/3320-47-0x0000000002590000-0x0000000002591000-memory.dmp
memory/3320-46-0x00000000025A0000-0x00000000025A1000-memory.dmp
memory/3320-43-0x0000000002590000-0x0000000002591000-memory.dmp
memory/3320-42-0x0000000002580000-0x0000000002581000-memory.dmp
memory/3320-40-0x0000000002560000-0x0000000002561000-memory.dmp
memory/3320-39-0x0000000002570000-0x0000000002571000-memory.dmp
memory/3320-36-0x0000000002560000-0x0000000002561000-memory.dmp
memory/3320-35-0x0000000002550000-0x0000000002551000-memory.dmp
memory/3320-33-0x0000000002530000-0x0000000002531000-memory.dmp
memory/3320-32-0x0000000002540000-0x0000000002541000-memory.dmp
memory/3320-31-0x0000000002540000-0x0000000002541000-memory.dmp
memory/3320-29-0x0000000002530000-0x0000000002531000-memory.dmp
Analysis: behavioral1
Detonation Overview
Submitted
2024-11-12 12:14
Reported
2024-11-12 12:17
Platform
win7-20240729-en
Max time kernel
150s
Max time network
143s
Command Line
Signatures
Modifies WinLogon for persistence
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," | C:\Windows\apppatch\svchost.exe | N/A |
Executes dropped EXE
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\apppatch\svchost.exe | N/A |
Loads dropped DLL
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
Modifies WinLogon
| Description | Indicator | Process | Target |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5ae4f1e1 = "C:\\Windows\\apppatch\\svchost.exe" | C:\Windows\apppatch\svchost.exe | N/A |
| Set value (str) | \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\5ae4f1e1 = "C:\\Windows\\apppatch\\svchost.exe" | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
Drops file in Windows directory
| Description | Indicator | Process | Target |
| File created | C:\Windows\apppatch\svchost.exe | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
| File opened for modification | C:\Windows\apppatch\svchost.exe | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
System Location Discovery: System Language Discovery
| Description | Indicator | Process | Target |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
| Key opened | \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language | C:\Windows\apppatch\svchost.exe | N/A |
Suspicious behavior: EnumeratesProcesses
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Windows\apppatch\svchost.exe | N/A |
Suspicious behavior: RenamesItself
| Description | Indicator | Process | Target |
| N/A | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | N/A |
Suspicious use of WriteProcessMemory
| Description | Indicator | Process | Target |
| PID 2252 wrote to memory of 2532 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
| PID 2252 wrote to memory of 2532 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
| PID 2252 wrote to memory of 2532 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
| PID 2252 wrote to memory of 2532 | N/A | C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe | C:\Windows\apppatch\svchost.exe |
Processes
C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe
"C:\Users\Admin\AppData\Local\Temp\56c87a1185ed6a8e688dfb9f658b651912c88f30b3001c89887fc7e91514fc8a.exe"
C:\Windows\apppatch\svchost.exe
"C:\Windows\apppatch\svchost.exe"
Network
| Country | Destination | Domain | Proto |
| US | 8.8.8.8:53 | bloodguiltiness.com | udp |
| GB | 92.123.128.134:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| GB | 92.123.128.134:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| GB | 92.123.128.134:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
| GB | 92.123.128.134:80 | www.bing.com | tcp |
| US | 15.197.130.221:80 | bloodguiltiness.com | tcp |
Files
memory/2252-0-0x0000000000270000-0x00000000002D7000-memory.dmp
memory/2252-1-0x0000000000400000-0x000000000046A000-memory.dmp
C:\Windows\AppPatch\svchost.exe
| MD5 | 89764bc23344d29c1b282d81fbb26233 |
| SHA1 | 72a18a089edbecfa8532ded8b3e39bfff2d69b95 |
| SHA256 | afd233173612eee8229f64940b9338eb741d88f6b10bd624f0e1accbc07f15b9 |
| SHA512 | 818d094d24e4424b1c0367833fa315cebc31802a18f41d02c009f6e7be3985ba226404d8133b8b844f053dbce2c5f1b68ff74f839cba956a91e3071136b2d05d |
memory/2252-17-0x0000000000400000-0x000000000046A000-memory.dmp
memory/2252-16-0x0000000000270000-0x00000000002D7000-memory.dmp
memory/2532-26-0x0000000002360000-0x00000000023F0000-memory.dmp
memory/2532-28-0x0000000002360000-0x00000000023F0000-memory.dmp
memory/2532-29-0x0000000000400000-0x000000000046A000-memory.dmp
memory/2532-24-0x0000000002360000-0x00000000023F0000-memory.dmp
memory/2532-22-0x0000000002360000-0x00000000023F0000-memory.dmp
memory/2532-20-0x0000000002360000-0x00000000023F0000-memory.dmp
memory/2532-18-0x0000000002360000-0x00000000023F0000-memory.dmp
memory/2532-30-0x00000000024F0000-0x000000000258F000-memory.dmp
memory/2532-32-0x00000000024F0000-0x000000000258F000-memory.dmp
memory/2532-34-0x00000000024F0000-0x000000000258F000-memory.dmp
memory/2532-47-0x00000000024F0000-0x000000000258F000-memory.dmp
memory/2532-76-0x00000000024F0000-0x000000000258F000-memory.dmp
memory/2532-75-0x0000000003280000-0x0000000003281000-memory.dmp
memory/2532-73-0x00000000031E0000-0x00000000031E1000-memory.dmp
memory/2532-72-0x0000000003270000-0x0000000003271000-memory.dmp
memory/2532-68-0x00000000031D0000-0x00000000031D1000-memory.dmp
memory/2532-66-0x00000000026A0000-0x00000000026A1000-memory.dmp
memory/2532-65-0x00000000031C0000-0x00000000031C1000-memory.dmp
memory/2532-62-0x00000000026A0000-0x00000000026A1000-memory.dmp
memory/2532-61-0x0000000002690000-0x0000000002691000-memory.dmp
memory/2532-59-0x00000000025B0000-0x00000000025B1000-memory.dmp
memory/2532-58-0x0000000002680000-0x0000000002681000-memory.dmp
memory/2532-55-0x00000000025B0000-0x00000000025B1000-memory.dmp
memory/2532-54-0x00000000025A0000-0x00000000025A1000-memory.dmp
memory/2532-52-0x0000000002040000-0x0000000002041000-memory.dmp
memory/2532-51-0x0000000002590000-0x0000000002591000-memory.dmp
memory/2532-50-0x0000000002590000-0x0000000002591000-memory.dmp
memory/2532-48-0x0000000002040000-0x0000000002041000-memory.dmp