Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
04-10-2022 07:31
Static task
static1
Behavioral task
behavioral1
Sample
35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe
Resource
win10v2004-20220812-en
General
-
Target
35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe
-
Size
712KB
-
MD5
2badfeb6ae78015ae0626faa442ca9ed
-
SHA1
005c0e801215093148c12467edb78f9b60de5750
-
SHA256
35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c
-
SHA512
945ed35aaa9a877ba768b51343d843ce9983e7c468b46a8041a5338ba63f065461cd22bf963d8fe5af9d7e01bbe6be01070cc4dfce3332ee6a3917a17a535730
-
SSDEEP
6144:HPNDXW8jOD/gSwgQM6/lkw3RRHxNjfOB8xOE5S:dW77gSw7WwB
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Corp = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe -
Executes dropped EXE 2 IoCs
pid Process 1660 svchosts.exe 4848 svchosts.exe -
resource yara_rule behavioral2/memory/1728-136-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1728-138-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1728-139-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1728-140-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/1728-146-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral2/memory/4848-155-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Corp = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe Key created \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\ 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe Set value (str) \REGISTRY\USER\S-1-5-21-2891029575-1462575-1165213807-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Microsoft Corp = "C:\\Users\\Admin\\AppData\\Roaming\\svchosts.exe" 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\ 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe File opened for modification \??\PhysicalDrive0 svchosts.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{11AAA8F6-E960-4BBD-98C6-F7B57FD41019}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{FBAC5B14-9DD1-4598-AC4B-2B531F049F2A}.catalogItem svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4544 set thread context of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 1660 set thread context of 4848 1660 svchosts.exe 79 -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 1660 svchosts.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 4544 wrote to memory of 1728 4544 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 77 PID 1728 wrote to memory of 1660 1728 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 78 PID 1728 wrote to memory of 1660 1728 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 78 PID 1728 wrote to memory of 1660 1728 35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe 78 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79 PID 1660 wrote to memory of 4848 1660 svchosts.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe"C:\Users\Admin\AppData\Local\Temp\35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4544 -
C:\Users\Admin\AppData\Local\Temp\35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe"C:\Users\Admin\AppData\Local\Temp\35a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c.exe"2⤵
- Adds policy Run key to start application
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Roaming\svchosts.exe/NEWSHIT3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Users\Admin\AppData\Roaming\svchosts.exe/NEWSHIT4⤵
- Executes dropped EXE
PID:4848
-
-
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
712KB
MD52badfeb6ae78015ae0626faa442ca9ed
SHA1005c0e801215093148c12467edb78f9b60de5750
SHA25635a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c
SHA512945ed35aaa9a877ba768b51343d843ce9983e7c468b46a8041a5338ba63f065461cd22bf963d8fe5af9d7e01bbe6be01070cc4dfce3332ee6a3917a17a535730
-
Filesize
712KB
MD52badfeb6ae78015ae0626faa442ca9ed
SHA1005c0e801215093148c12467edb78f9b60de5750
SHA25635a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c
SHA512945ed35aaa9a877ba768b51343d843ce9983e7c468b46a8041a5338ba63f065461cd22bf963d8fe5af9d7e01bbe6be01070cc4dfce3332ee6a3917a17a535730
-
Filesize
712KB
MD52badfeb6ae78015ae0626faa442ca9ed
SHA1005c0e801215093148c12467edb78f9b60de5750
SHA25635a18d64a53f6f9c18d7709f2c55757c893a328f30c38cb26eea2b07f570467c
SHA512945ed35aaa9a877ba768b51343d843ce9983e7c468b46a8041a5338ba63f065461cd22bf963d8fe5af9d7e01bbe6be01070cc4dfce3332ee6a3917a17a535730