Analysis
-
max time kernel
149s -
max time network
89s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
02-12-2022 22:54
Static task
static1
Behavioral task
behavioral1
Sample
8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe
Resource
win10v2004-20220812-en
General
-
Target
8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe
-
Size
172KB
-
MD5
e192ba029e3e51fbb4968be451dd02c3
-
SHA1
501dd63e9584629c0fa3fe965ee8006fe4bc12c9
-
SHA256
8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90
-
SHA512
e21f5d9ef0e87a9d1269ec833c4e72a0d6f78ea96479eda67532c77e62f5f1cdba1a2bb83ac74576ecb916afb7c7deb57624574dfa77f9051b3a6422df62e2fb
-
SSDEEP
3072:QH69DiMTdgP6RvRP5VwYznpDB/vWwvbSlJHy/r/zMJmd7DX4Xj:th3CSR1Q6L/vNvySj/zCgDXw
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1944 svchst.exe 1876 svchst.exe -
Modifies AppInit DLL entries 2 TTPs
-
resource yara_rule behavioral1/memory/1456-57-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1456-59-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1456-60-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1456-62-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1456-64-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1456-65-0x0000000000400000-0x0000000000439000-memory.dmp upx behavioral1/memory/1456-66-0x0000000000400000-0x0000000000439000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion svchst.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Enumerates connected drives 3 TTPs 44 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\v: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\r: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\j: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\o: svchst.exe File opened (read-only) \??\l: svchst.exe File opened (read-only) \??\w: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\o: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\y: svchst.exe File opened (read-only) \??\s: svchst.exe File opened (read-only) \??\j: svchst.exe File opened (read-only) \??\x: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\i: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\x: svchst.exe File opened (read-only) \??\r: svchst.exe File opened (read-only) \??\q: svchst.exe File opened (read-only) \??\n: svchst.exe File opened (read-only) \??\h: svchst.exe File opened (read-only) \??\y: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\q: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\h: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\w: svchst.exe File opened (read-only) \??\u: svchst.exe File opened (read-only) \??\t: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\n: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\f: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\v: svchst.exe File opened (read-only) \??\p: svchst.exe File opened (read-only) \??\g: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\e: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\z: svchst.exe File opened (read-only) \??\z: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\s: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\p: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\m: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\k: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\t: svchst.exe File opened (read-only) \??\m: svchst.exe File opened (read-only) \??\k: svchst.exe File opened (read-only) \??\i: svchst.exe File opened (read-only) \??\g: svchst.exe File opened (read-only) \??\f: svchst.exe File opened (read-only) \??\e: svchst.exe File opened (read-only) \??\u: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened (read-only) \??\l: 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat svchst.exe File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\sLT.exf svchst.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 956 set thread context of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 1944 set thread context of 1876 1944 svchst.exe 30 -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\mssys.dll svchst.exe File created C:\Windows\mssys.dll 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File created C:\Windows\svchst.exe 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe File opened for modification C:\Windows\svchst.exe 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings svchst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchst.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings svchst.exe Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" svchst.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 svchst.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 1944 svchst.exe 1944 svchst.exe 1944 svchst.exe 1944 svchst.exe 1944 svchst.exe 1944 svchst.exe 1944 svchst.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 956 wrote to memory of 1456 956 8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe 28 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30 PID 1944 wrote to memory of 1876 1944 svchst.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe"C:\Users\Admin\AppData\Local\Temp\8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe"1⤵
- Checks BIOS information in registry
- Enumerates connected drives
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Users\Admin\AppData\Local\Temp\8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe"C:\Users\Admin\AppData\Local\Temp\8448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90.exe"2⤵
- Drops file in Windows directory
PID:1456
-
-
C:\Windows\svchst.exeC:\Windows\svchst.exe1⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Enumerates connected drives
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\svchst.exeC:\Windows\svchst.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:1876
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
172KB
MD5e192ba029e3e51fbb4968be451dd02c3
SHA1501dd63e9584629c0fa3fe965ee8006fe4bc12c9
SHA2568448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90
SHA512e21f5d9ef0e87a9d1269ec833c4e72a0d6f78ea96479eda67532c77e62f5f1cdba1a2bb83ac74576ecb916afb7c7deb57624574dfa77f9051b3a6422df62e2fb
-
Filesize
172KB
MD5e192ba029e3e51fbb4968be451dd02c3
SHA1501dd63e9584629c0fa3fe965ee8006fe4bc12c9
SHA2568448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90
SHA512e21f5d9ef0e87a9d1269ec833c4e72a0d6f78ea96479eda67532c77e62f5f1cdba1a2bb83ac74576ecb916afb7c7deb57624574dfa77f9051b3a6422df62e2fb
-
Filesize
172KB
MD5e192ba029e3e51fbb4968be451dd02c3
SHA1501dd63e9584629c0fa3fe965ee8006fe4bc12c9
SHA2568448cb641cecddcebb71006ca0368e94b587261cb314f7498fbc916625954b90
SHA512e21f5d9ef0e87a9d1269ec833c4e72a0d6f78ea96479eda67532c77e62f5f1cdba1a2bb83ac74576ecb916afb7c7deb57624574dfa77f9051b3a6422df62e2fb