Analysis
-
max time kernel
157s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
27-11-2022 00:22
Static task
static1
Behavioral task
behavioral1
Sample
0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe
Resource
win10v2004-20220812-en
General
-
Target
0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe
-
Size
130KB
-
MD5
1b393f35a3329bf17af357f26b6abc9e
-
SHA1
6544adf7e31f7514c753a01dc408a6ee9e6d9f77
-
SHA256
0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8
-
SHA512
3a317fb845a4181047fcac4e109cd34b413d5ceaa854fb8c0d5acbe01d72ffb35c7812d3961c8ce6be804c907c5daa951211c6238cdac7a84a573fe1b0a86b14
-
SSDEEP
3072:sXvZEHA1EaU6mLVQQ9oi3W45qy/Uua6B264qE+El:sXTUC7i3W45GuH26w
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Service Host = "C:\\Windows\\SysWOW64\\Microsoft\\Windows\\System32\\svchost.exe -k LocalService" svchost.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Service Host = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\svchost.exe -k LocalService" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1948 svchost.exe -
Deletes itself 1 IoCs
pid Process 1948 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 1900 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe 1900 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File opened for modification C:\Windows\system32\Microsoft 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\system32\Microsoft\Windows 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Windows\System32 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Windows\System32\svchost.exe 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\SysWOW64\Microsoft 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\SysWOW64\Microsoft\Windows 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\system32\Microsoft\Windows\System32 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\system32\Microsoft\Windows\System32\svchost.exe 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File created C:\Windows\SysWOW64\Microsoft\Windows\System32\svchost.exe 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\INF\setupapi.app.log 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe File opened for modification C:\Windows\INF\setupapi.app.log svchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1948 svchost.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1900 wrote to memory of 1948 1900 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe 27 PID 1900 wrote to memory of 1948 1900 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe 27 PID 1900 wrote to memory of 1948 1900 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe 27 PID 1900 wrote to memory of 1948 1900 0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe"C:\Users\Admin\AppData\Local\Temp\0a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1900 -
C:\Windows\SysWOW64\Microsoft\Windows\System32\svchost.exeC:\Windows\System32\Microsoft\Windows\System32\svchost.exe -k LocalService -d110816651701118101771318699186137173181119130616169171725111661110211181510713111999165137153181115961617141717107166811111815197139199495613718318112159616314171717141667811187107138199914218137191318111615461618121741710716619161118014671391909916131376921811161561619211171714141661217111856713319991013137179181177616141241717716166128111876713181999161313717918116761619111717121416461517011181321071361829096513725341811216152616111117171116166128111821867131918993131371692181111761614121717121416614811185671351899131313071691811167616171217177141667811181541071317189919513710918111615616911171771416691711181360713415189918130137649181116156161612171781416631711188571318199910613717318112⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Deletes itself
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
PID:1948
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
130KB
MD51b393f35a3329bf17af357f26b6abc9e
SHA16544adf7e31f7514c753a01dc408a6ee9e6d9f77
SHA2560a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8
SHA5123a317fb845a4181047fcac4e109cd34b413d5ceaa854fb8c0d5acbe01d72ffb35c7812d3961c8ce6be804c907c5daa951211c6238cdac7a84a573fe1b0a86b14
-
Filesize
130KB
MD51b393f35a3329bf17af357f26b6abc9e
SHA16544adf7e31f7514c753a01dc408a6ee9e6d9f77
SHA2560a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8
SHA5123a317fb845a4181047fcac4e109cd34b413d5ceaa854fb8c0d5acbe01d72ffb35c7812d3961c8ce6be804c907c5daa951211c6238cdac7a84a573fe1b0a86b14
-
Filesize
130KB
MD51b393f35a3329bf17af357f26b6abc9e
SHA16544adf7e31f7514c753a01dc408a6ee9e6d9f77
SHA2560a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8
SHA5123a317fb845a4181047fcac4e109cd34b413d5ceaa854fb8c0d5acbe01d72ffb35c7812d3961c8ce6be804c907c5daa951211c6238cdac7a84a573fe1b0a86b14
-
Filesize
130KB
MD51b393f35a3329bf17af357f26b6abc9e
SHA16544adf7e31f7514c753a01dc408a6ee9e6d9f77
SHA2560a93e0d48d859f5d1e9510f6e7ebe53d78277ffb86175aecd9f6e9e55233ecb8
SHA5123a317fb845a4181047fcac4e109cd34b413d5ceaa854fb8c0d5acbe01d72ffb35c7812d3961c8ce6be804c907c5daa951211c6238cdac7a84a573fe1b0a86b14