Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe
Resource
win10v2004-20220901-en
General
-
Target
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe
-
Size
28KB
-
MD5
9210400bcbba5ab64aaf74105a908666
-
SHA1
10e1a65e4ddcd3470fe51c6657eba9f8ad82264c
-
SHA256
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
-
SHA512
d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41
-
SSDEEP
768:R3D+rTUN8N2P4z5vYaNutSGhDCCWGrEhJxA6r4ru:R+rTU5PkvcSGhDtUJxh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1752 svohcst.exe -
resource yara_rule behavioral1/memory/1848-54-0x0000000000020000-0x0000000000034000-memory.dmp upx behavioral1/memory/1752-59-0x00000000001E0000-0x00000000001F4000-memory.dmp upx behavioral1/memory/1848-62-0x0000000000020000-0x0000000000034000-memory.dmp upx behavioral1/memory/1752-64-0x00000000001E0000-0x00000000001F4000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1436 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436 svohcst.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\A8985D3A65E5E5C4B2D7D66D40C6DD2FB19C5436\Blob = 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 svohcst.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1304 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe 1752 svohcst.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1848 wrote to memory of 1752 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 28 PID 1848 wrote to memory of 1752 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 28 PID 1848 wrote to memory of 1752 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 28 PID 1848 wrote to memory of 1752 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 28 PID 1848 wrote to memory of 1436 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 29 PID 1848 wrote to memory of 1436 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 29 PID 1848 wrote to memory of 1436 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 29 PID 1848 wrote to memory of 1436 1848 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 29 PID 1436 wrote to memory of 1304 1436 cmd.exe 31 PID 1436 wrote to memory of 1304 1436 cmd.exe 31 PID 1436 wrote to memory of 1304 1436 cmd.exe 31 PID 1436 wrote to memory of 1304 1436 cmd.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe"C:\Users\Admin\AppData\Local\Temp\016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe2⤵
- Executes dropped EXE
- Modifies system certificate store
- Suspicious behavior: EnumeratesProcesses
PID:1752
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping localhost -n 10 && del "C:\Users\Admin\AppData\Local\Temp\016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1436 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 103⤵
- Runs ping.exe
PID:1304
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD59210400bcbba5ab64aaf74105a908666
SHA110e1a65e4ddcd3470fe51c6657eba9f8ad82264c
SHA256016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
SHA512d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41
-
Filesize
28KB
MD59210400bcbba5ab64aaf74105a908666
SHA110e1a65e4ddcd3470fe51c6657eba9f8ad82264c
SHA256016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
SHA512d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41
-
Filesize
28KB
MD59210400bcbba5ab64aaf74105a908666
SHA110e1a65e4ddcd3470fe51c6657eba9f8ad82264c
SHA256016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
SHA512d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41