Analysis
-
max time kernel
170s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
02/10/2022, 09:24
Static task
static1
Behavioral task
behavioral1
Sample
0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe
Resource
win10v2004-20220812-en
General
-
Target
0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe
-
Size
620KB
-
MD5
01f9e3b9ba65dbc9d1592b907ae8313b
-
SHA1
c3d87495e52aff278ada34a8e9d03c13155ccd35
-
SHA256
0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4
-
SHA512
5b1f7c3ddfb7e0c2fe87c111a72e58e4de8db28142c100bbd5db15b104304302216f16cacb43ccc16a5e2d43e1a2289d22254e6965e3ddeb11b23295127fcc38
-
SSDEEP
6144:GPNDXW8jOD/gSwgQM6/lkw3RRHxNjfOB8xOE5S:wW77gSw7WwB
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Corp = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe -
Executes dropped EXE 2 IoCs
pid Process 4344 svchosts.exe 4984 svchosts.exe -
resource yara_rule behavioral2/memory/5100-136-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-139-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-140-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/5100-146-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4984-156-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Corp = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Corp = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe Key created \REGISTRY\USER\S-1-5-21-2295526160-1155304984-640977766-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe File opened for modification \??\PhysicalDrive0 svchosts.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1200 set thread context of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 4344 set thread context of 4984 4344 svchosts.exe 85 -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 4344 svchosts.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 1200 wrote to memory of 5100 1200 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 83 PID 5100 wrote to memory of 4344 5100 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 84 PID 5100 wrote to memory of 4344 5100 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 84 PID 5100 wrote to memory of 4344 5100 0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe 84 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85 PID 4344 wrote to memory of 4984 4344 svchosts.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe"C:\Users\Admin\AppData\Local\Temp\0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1200 -
C:\Users\Admin\AppData\Local\Temp\0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe"C:\Users\Admin\AppData\Local\Temp\0b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:5100 -
C:\Users\Admin\AppData\Roaming\svchosts.exe/NEWSHIT3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4344 -
C:\Users\Admin\AppData\Roaming\svchosts.exe/NEWSHIT4⤵
- Executes dropped EXE
PID:4984
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
620KB
MD501f9e3b9ba65dbc9d1592b907ae8313b
SHA1c3d87495e52aff278ada34a8e9d03c13155ccd35
SHA2560b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4
SHA5125b1f7c3ddfb7e0c2fe87c111a72e58e4de8db28142c100bbd5db15b104304302216f16cacb43ccc16a5e2d43e1a2289d22254e6965e3ddeb11b23295127fcc38
-
Filesize
620KB
MD501f9e3b9ba65dbc9d1592b907ae8313b
SHA1c3d87495e52aff278ada34a8e9d03c13155ccd35
SHA2560b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4
SHA5125b1f7c3ddfb7e0c2fe87c111a72e58e4de8db28142c100bbd5db15b104304302216f16cacb43ccc16a5e2d43e1a2289d22254e6965e3ddeb11b23295127fcc38
-
Filesize
620KB
MD501f9e3b9ba65dbc9d1592b907ae8313b
SHA1c3d87495e52aff278ada34a8e9d03c13155ccd35
SHA2560b316a631fc8070439407abefcde6e9b25fd9519dc587e5b2bf599269a059ea4
SHA5125b1f7c3ddfb7e0c2fe87c111a72e58e4de8db28142c100bbd5db15b104304302216f16cacb43ccc16a5e2d43e1a2289d22254e6965e3ddeb11b23295127fcc38