Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
20/11/2024, 04:43
Static task
static1
Behavioral task
behavioral1
Sample
dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe
Resource
win10v2004-20241007-en
General
-
Target
dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe
-
Size
204KB
-
MD5
5866cbd8f155f9a52a5c06cfede3f26f
-
SHA1
89bc8ec013bdac6de4e81eb7e2b7233554b554cc
-
SHA256
dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85
-
SHA512
420db1a5e94d5e0991c9dd96da79c6f613b52fa9d4791d05c2930d02b48a9b9957c9cee5cc411d26d7d9b35541d69a9648cb8c2e8273f7e4228e3d329a9f6050
-
SSDEEP
3072:9O/6nl92ILkt6i2ox7c39b1a0J86W8xXCKNWOHU/ezYMVWtG4SPUkxbgl:9gFtboVBJtNWyPnYG4fUbk
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\apppatch\\svchost.exe," svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 2340 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9df9bdfc = "C:\\Windows\\apppatch\\svchost.exe" dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\9df9bdfc = "C:\\Windows\\apppatch\\svchost.exe" svchost.exe -
Drops file in Program Files directory 10 IoCs
description ioc Process File created C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vonypom.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vojyqem.com svchost.exe File created C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\vocyzit.com svchost.exe File created C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File opened for modification C:\Program Files (x86)\Windows Defender\lymyxid.com svchost.exe File created C:\Program Files (x86)\Windows Defender\qetyfuv.com svchost.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\apppatch\svchost.exe dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe File opened for modification C:\Windows\apppatch\svchost.exe dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2340 svchost.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 944 wrote to memory of 2340 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe 31 PID 944 wrote to memory of 2340 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe 31 PID 944 wrote to memory of 2340 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe 31 PID 944 wrote to memory of 2340 944 dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe"C:\Users\Admin\AppData\Local\Temp\dee5627b5e4aa2a4d6ab9ab07d28041fce2cbae835ded911608ccc6acf0ebc85.exe"1⤵
- Loads dropped DLL
- Modifies WinLogon
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\apppatch\svchost.exe"C:\Windows\apppatch\svchost.exe"2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Modifies WinLogon
- Drops file in Program Files directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:2340
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d37e82f0a1dff60288f32263a03026c0
SHA1801258bb764cca58926d4752458190269e6db99a
SHA2561382cf3ba0e67f4bc4afefbed8f9a7d474426e33b5a297405dd328498aca00bf
SHA51299731209af7d3c2c7ee488e56e8f07112621ed53bb4bb98aa97af8eb981de25c841fb0b7e2f9bc6e016f6a052d77b3c1e291f9cae1f6ec567b71817b91916935
-
Filesize
1KB
MD5da28ba403a6d9dd81d3ed2a8911230d2
SHA105a889527649263fca5c075f0708ff1e010e09c8
SHA256e7b4afb329a8532787d30efc0c6df39edd54ec1bb87443f40cb1bb3b77e4bc32
SHA51233e445099301cfeb368870b66aee8f423f1a3fef991ba4f2c464ef276cbe42ca191bfea3a2d2c4ff7379b0c6355164218d89523db62353b81c5a052aad6f787c
-
Filesize
1KB
MD56c354f4a046b942c163af2dc8b1fd5ef
SHA1afa13f04e160eb83df179ee9db8820d4ba00d235
SHA256b7c11a6a3871dbc06e38b85990285bda0d7d15f4e4f6a08cb091673d6d5b4127
SHA512b75579bbbf5f0af36b283edcc22951a2d95fd7b3c9020fb29bdb8bcb1af12cc66e9198c3e9f3dbd81d43cbb8927e444d43af5f779d40542e192c1a3297971f34
-
Filesize
1KB
MD5710b105d5f4f5163dc9db7e997ccbcab
SHA19ae8b2da732f680522e118305efba644e6edc241
SHA256ea3ff7c9536d171c7ff4e04d680fabacd7158936c7c90b5b65b9d912038b59c0
SHA512eb6b86cd58af18e53e3016373e4577d4fb43f87acd8ef0ee583b7bff1d505336840c9d58087622916b9e80e39a4e66c89fce2967609627d7e78cd194411a4197
-
Filesize
204KB
MD5997852d5261d79aec27a086c6108ff31
SHA12797c9c5da0f2e29167da6d9b44e36374f89969e
SHA2560d849e0a7b61c39b59c6baba89281106633a74f50e5ce02a365e0fb4b775dead
SHA5124543bafc6fc7e04760fbd047d4d0a9b1177252c9f67cf97a86dafc5d461a9d833ed90a8ddb5a6582617fd085ec5b49a6a4d3a6c8e04461a4a19a4e48f1f78179