Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
19/10/2022, 23:43
Static task
static1
Behavioral task
behavioral1
Sample
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe
Resource
win10v2004-20220901-en
General
-
Target
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe
-
Size
28KB
-
MD5
9210400bcbba5ab64aaf74105a908666
-
SHA1
10e1a65e4ddcd3470fe51c6657eba9f8ad82264c
-
SHA256
016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
-
SHA512
d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41
-
SSDEEP
768:R3D+rTUN8N2P4z5vYaNutSGhDCCWGrEhJxA6r4ru:R+rTU5PkvcSGhDtUJxh
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4912 svohcst.exe -
resource yara_rule behavioral2/memory/1712-132-0x0000000000100000-0x0000000000114000-memory.dmp upx behavioral2/memory/1712-139-0x0000000000100000-0x0000000000114000-memory.dmp upx behavioral2/memory/4912-141-0x0000000000100000-0x0000000000114000-memory.dmp upx behavioral2/memory/4912-142-0x0000000000100000-0x0000000000114000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 2352 PING.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe 4912 svohcst.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1712 wrote to memory of 4912 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 81 PID 1712 wrote to memory of 4912 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 81 PID 1712 wrote to memory of 4912 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 81 PID 1712 wrote to memory of 4888 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 82 PID 1712 wrote to memory of 4888 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 82 PID 1712 wrote to memory of 4888 1712 016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe 82 PID 4888 wrote to memory of 2352 4888 cmd.exe 84 PID 4888 wrote to memory of 2352 4888 cmd.exe 84 PID 4888 wrote to memory of 2352 4888 cmd.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe"C:\Users\Admin\AppData\Local\Temp\016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4912
-
-
C:\Windows\SysWOW64\cmd.execmd.exe /c ping localhost -n 10 && del "C:\Users\Admin\AppData\Local\Temp\016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4888 -
C:\Windows\SysWOW64\PING.EXEping localhost -n 103⤵
- Runs ping.exe
PID:2352
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD59210400bcbba5ab64aaf74105a908666
SHA110e1a65e4ddcd3470fe51c6657eba9f8ad82264c
SHA256016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
SHA512d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41
-
Filesize
28KB
MD59210400bcbba5ab64aaf74105a908666
SHA110e1a65e4ddcd3470fe51c6657eba9f8ad82264c
SHA256016abf41120b65847825a1b64e35243a980088187dbafac8d43bf8955131d17c
SHA512d87fb1ea82df929a6c96b4467818858fe2d028f4dcb46c2fe95e763b6c9e0c3b22a608503fff017d70b01f8bb940915df71a4787192ebba5973b3c472315ee41