Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 10:01
Static task
static1
Behavioral task
behavioral1
Sample
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe
Resource
win10v2004-20220812-en
General
-
Target
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe
-
Size
52KB
-
MD5
8b71cd888da67ae3eeae97480a29d2e9
-
SHA1
93a5c1e83b8a02ebc1f2f146e1e7716a78be310e
-
SHA256
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce
-
SHA512
ea4cdb9ece8e1f3244b24ae63dac3fdcf93583e86d4e6c15d0634f0ac772e4f018f2587cd8782d11b9d6fa91fb03f2cafeb6ae5e012b8c52bd93734dd098162e
-
SSDEEP
768:aHyEBK+o6yMPqgRDMa6RwTdQXQ/6m/4Jk8gqCfFC:aHL1Rt20BCJkkUF
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
svchobst.exepid process 916 svchobst.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 960 cmd.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
svchobst.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ = "C:\\Windows\\svchobst.exe" svchobst.exe -
Drops file in Windows directory 2 IoCs
Processes:
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exedescription ioc process File created C:\Windows\svchobst.exe d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe File opened for modification C:\Windows\svchobst.exe d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchobst.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 svchobst.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchobst.exe -
Processes:
iexplore.exeIEXPLORE.EXEdescription ioc process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{6FF50ED1-6B20-11ED-9351-5A21EB137514} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\NextUpdateDate = "375967234" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\en-US = "en-US.1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion\FileNames\ iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\DomainSuggestion iexplore.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exedescription pid process Token: SeIncBasePriorityPrivilege 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
Processes:
iexplore.exepid process 968 iexplore.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
iexplore.exeIEXPLORE.EXEpid process 968 iexplore.exe 968 iexplore.exe 1068 IEXPLORE.EXE 1068 IEXPLORE.EXE 1068 IEXPLORE.EXE 1068 IEXPLORE.EXE -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exesvchobst.exeiexplore.exedescription pid process target process PID 1848 wrote to memory of 916 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe svchobst.exe PID 1848 wrote to memory of 916 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe svchobst.exe PID 1848 wrote to memory of 916 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe svchobst.exe PID 1848 wrote to memory of 916 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe svchobst.exe PID 916 wrote to memory of 968 916 svchobst.exe iexplore.exe PID 916 wrote to memory of 968 916 svchobst.exe iexplore.exe PID 916 wrote to memory of 968 916 svchobst.exe iexplore.exe PID 916 wrote to memory of 968 916 svchobst.exe iexplore.exe PID 1848 wrote to memory of 960 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe cmd.exe PID 1848 wrote to memory of 960 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe cmd.exe PID 1848 wrote to memory of 960 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe cmd.exe PID 1848 wrote to memory of 960 1848 d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe cmd.exe PID 968 wrote to memory of 1068 968 iexplore.exe IEXPLORE.EXE PID 968 wrote to memory of 1068 968 iexplore.exe IEXPLORE.EXE PID 968 wrote to memory of 1068 968 iexplore.exe IEXPLORE.EXE PID 968 wrote to memory of 1068 968 iexplore.exe IEXPLORE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe"C:\Users\Admin\AppData\Local\Temp\d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1848 -
C:\Windows\svchobst.exe"C:\Windows\svchobst.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:916 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" £¾½¸ýéê ±ï¡Þ×Ô’ÏÌ–Ò˜ÝÀÞÞ±°¯®¬«ª©¨§¦¥¤£¢¡ Ÿžœ›š™˜—–•”“’‘ŽŒ‹Š‰ˆ‡†…„ƒ‚€~}|{zyxwvutsrqponmlkjihgfedcba`_^3⤵
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:968 CREDAT:275457 /prefetch:24⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1068 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\D54797~1.EXE > nul2⤵
- Deletes itself
PID:960
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize340B
MD5ba4f4c5cdeb68ad951658254a76b5d96
SHA12b51d2af1063d0693b2eb71ac28fb5e8e21a496d
SHA256bdcff5244e9c3592ad5ba86f6a56524920c179c88ade37e196d276236425cea2
SHA512a0d63f0d62303262321fe9e2b8ddfc277c08f8cba200619f9de0277f455ee1b9545f8b60edf735b8bd360bfa94a706905c45d5910b601f16293480ada415430c
-
Filesize
608B
MD52a99ca2096daec406f79717bfc71140a
SHA1add9da9b5ea3b68ca831cdb8813a11982f95e0f9
SHA256dcfd069b6eff225da936cbe01399543c92577de087273fb305f724349022b333
SHA5126edb186c179d6467fd56c6711277a64efbaf6d19cbea9901eb191db29901d129af00309e0041c20560e6e472f7c344815e62300d38f7d6599e54d83ff965baaa
-
Filesize
52KB
MD58b71cd888da67ae3eeae97480a29d2e9
SHA193a5c1e83b8a02ebc1f2f146e1e7716a78be310e
SHA256d547974a82beeb6e0020d968fbe484a83a8aa5fc3ca6d452c8cd1315a78c37ce
SHA512ea4cdb9ece8e1f3244b24ae63dac3fdcf93583e86d4e6c15d0634f0ac772e4f018f2587cd8782d11b9d6fa91fb03f2cafeb6ae5e012b8c52bd93734dd098162e