Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20241010-en -
resource tags
arch:x64arch:x86image:win7-20241010-enlocale:en-usos:windows7-x64system -
submitted
19/11/2024, 19:22
Static task
static1
Behavioral task
behavioral1
Sample
0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe
Resource
win10v2004-20241007-en
General
-
Target
0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe
-
Size
204KB
-
MD5
67aaef7927e3eee14ad886752c81976b
-
SHA1
94556579509742e1be30dc8d1a0c26eb78790233
-
SHA256
0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04
-
SHA512
0befc2d61492850e9e8232bcab27cf7988437d1f5b88367b8b015cefde84cbdd1ce100223571181d29d987ce4103a48e208085ec2fdf921fc0ab1bcd2aa8dc92
-
SSDEEP
3072:mO/6nl92ILkt6i2ox7c39b1a0J86W8xXCKNWOHU/ezYMVWtG4SPUkxbgl:mgFtboVBJtNWyPnYG4fUbk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2256 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\78a41585 = "C:\\Windows\\apppatch\\svchost.exe" 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\78a41585 = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 8 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File created C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\galyqaz.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe File opened for modification C:\Windows\apppatch\svchost.exe 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2256 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2220 wrote to memory of 2256 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe 29 PID 2220 wrote to memory of 2256 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe 29 PID 2220 wrote to memory of 2256 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe 29 PID 2220 wrote to memory of 2256 2220 0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe"C:\Users\Admin\AppData\Local\Temp\0950663ad0e7a2498cd96444cf37f8fe4c3646fc0056b6abd25d0ccd1a781d04.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2256
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
99KB
MD5ed05167ca22048b2bd938b29aec127e9
SHA17564825365d7bb5913d71767efceef91b8d8ad44
SHA256a5bdbeba9b85386284b3228ef667664b4ce008044317da64cb4aba3f633e0766
SHA5129edd3b23b2e984e04074d9bedae2f2012a4f37dc06ef7149087f2a6ccc661281e8ee8a376580538c8592519d7733229d5e23f7599675308b1ffd2b6f9ce3fc15
-
Filesize
99KB
MD55ea8a8239f6d8e82bbc13d31dba987f9
SHA1b0c5179ffcc12235a655f3026f5e6cc32469c3fc
SHA25678622cc6edb104e16825030b1e172c017b7a12e17416b8384709c0639b6f3d2b
SHA51236382be3b6426505819cc5ab2a8aea53716371e0452629771303d1371fb1e2f8e721bf3fffee2bc99bf137be04bb4eee8254eda9088bdfbdba06e6d57d1c615c
-
Filesize
1KB
MD541a9e52c31d297fd53e9478e2bb3872a
SHA11a12ad93ae36540d2bd4c6292c6229f8105d598d
SHA25648a12734598348e741bbb7da28340aee9ab1d07198e21112dd3a49ae35063f80
SHA512cf57b59c285f8f58b897f7412bd3508ccf6c06d83d254d1ca565076b37b5a46db5d95be64ffe1647f2d0bb81dd9111df50b80a372d75b15f5deb14784469b72e
-
Filesize
204KB
MD569cb8bbafaaba49747cb62e00bc68080
SHA1e7e1fedf55c74460306016306d565e9763f2c809
SHA2563280551b4217597b29ca2f31aae9c70e2c5245a09ff8253044abd8adae6dc36c
SHA5121cc9f89da94e099e98acf77fd65db2619aeae2febdb7f669448210261860ad4d370f3af5564df38c42c80e97c530240923a1a95eefb0560911914e6be5c8c5ef