Analysis
-
max time kernel
187s -
max time network
53s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03-12-2022 17:23
Behavioral task
behavioral1
Sample
c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe
Resource
win10v2004-20220812-en
General
-
Target
c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe
-
Size
869KB
-
MD5
f66a41ba9c64229712c999f68874ff83
-
SHA1
9d357ecfb87205bef0b7b8a92f54538ef5fbff67
-
SHA256
c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162
-
SHA512
b97468ebcc536b9c24d4db4fd0747fae7aa8dbc571a5ddb9df80abbf1e0f8bcac916b4ea5737299f42f3870802867f1fbf15d9640b02f1a5740131d1362e1272
-
SSDEEP
3072:wpe9FXOGoqa74l4Hx3UVGTTGDyxN2eho55aZMXi1+WiXooJKkQa1g6rt/pd1GQpP:w83e1Dubhz1LOh3FVvQ+yC
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1712 svchost.exe 1424 svchost.exe -
resource yara_rule behavioral1/memory/1776-54-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral1/memory/1608-57-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1776-62-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral1/memory/1608-61-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1608-63-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1608-67-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/files/0x00140000000054ab-65.dat upx behavioral1/files/0x00140000000054ab-64.dat upx behavioral1/files/0x00140000000054ab-68.dat upx behavioral1/files/0x00140000000054ab-71.dat upx behavioral1/files/0x00140000000054ab-74.dat upx behavioral1/memory/1712-78-0x0000000000400000-0x00000000004DB000-memory.dmp upx behavioral1/memory/1424-79-0x0000000000400000-0x0000000000416000-memory.dmp upx behavioral1/memory/1424-80-0x0000000000400000-0x0000000000416000-memory.dmp upx -
Loads dropped DLL 2 IoCs
pid Process 1608 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 1608 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Startup = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchost.exe" c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: svchost.exe File opened (read-only) \??\R: svchost.exe File opened (read-only) \??\W: svchost.exe File opened (read-only) \??\X: svchost.exe File opened (read-only) \??\F: svchost.exe File opened (read-only) \??\P: svchost.exe File opened (read-only) \??\O: svchost.exe File opened (read-only) \??\U: svchost.exe File opened (read-only) \??\Z: svchost.exe File opened (read-only) \??\M: svchost.exe File opened (read-only) \??\N: svchost.exe File opened (read-only) \??\I: svchost.exe File opened (read-only) \??\J: svchost.exe File opened (read-only) \??\E: svchost.exe File opened (read-only) \??\H: svchost.exe File opened (read-only) \??\L: svchost.exe File opened (read-only) \??\S: svchost.exe File opened (read-only) \??\T: svchost.exe File opened (read-only) \??\V: svchost.exe File opened (read-only) \??\Y: svchost.exe File opened (read-only) \??\G: svchost.exe File opened (read-only) \??\K: svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1776 set thread context of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1712 set thread context of 1424 1712 svchost.exe 29 -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1424 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 1712 svchost.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1776 wrote to memory of 1608 1776 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 27 PID 1608 wrote to memory of 1712 1608 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 28 PID 1608 wrote to memory of 1712 1608 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 28 PID 1608 wrote to memory of 1712 1608 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 28 PID 1608 wrote to memory of 1712 1608 c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe 28 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29 PID 1712 wrote to memory of 1424 1712 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe"C:\Users\Admin\AppData\Local\Temp\c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exeC:\Users\Admin\AppData\Local\Temp\c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\Microsoft\svchost.exeC:\Users\Admin\AppData\Roaming\Microsoft\svchost.exe4⤵
- Executes dropped EXE
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
PID:1424
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
869KB
MD5f66a41ba9c64229712c999f68874ff83
SHA19d357ecfb87205bef0b7b8a92f54538ef5fbff67
SHA256c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162
SHA512b97468ebcc536b9c24d4db4fd0747fae7aa8dbc571a5ddb9df80abbf1e0f8bcac916b4ea5737299f42f3870802867f1fbf15d9640b02f1a5740131d1362e1272
-
Filesize
869KB
MD5f66a41ba9c64229712c999f68874ff83
SHA19d357ecfb87205bef0b7b8a92f54538ef5fbff67
SHA256c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162
SHA512b97468ebcc536b9c24d4db4fd0747fae7aa8dbc571a5ddb9df80abbf1e0f8bcac916b4ea5737299f42f3870802867f1fbf15d9640b02f1a5740131d1362e1272
-
Filesize
869KB
MD5f66a41ba9c64229712c999f68874ff83
SHA19d357ecfb87205bef0b7b8a92f54538ef5fbff67
SHA256c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162
SHA512b97468ebcc536b9c24d4db4fd0747fae7aa8dbc571a5ddb9df80abbf1e0f8bcac916b4ea5737299f42f3870802867f1fbf15d9640b02f1a5740131d1362e1272
-
Filesize
869KB
MD5f66a41ba9c64229712c999f68874ff83
SHA19d357ecfb87205bef0b7b8a92f54538ef5fbff67
SHA256c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162
SHA512b97468ebcc536b9c24d4db4fd0747fae7aa8dbc571a5ddb9df80abbf1e0f8bcac916b4ea5737299f42f3870802867f1fbf15d9640b02f1a5740131d1362e1272
-
Filesize
869KB
MD5f66a41ba9c64229712c999f68874ff83
SHA19d357ecfb87205bef0b7b8a92f54538ef5fbff67
SHA256c9cb36c41bebae790540f95d4afd50a73d24e5f10929c397b60ddec8456b7162
SHA512b97468ebcc536b9c24d4db4fd0747fae7aa8dbc571a5ddb9df80abbf1e0f8bcac916b4ea5737299f42f3870802867f1fbf15d9640b02f1a5740131d1362e1272