Analysis
-
max time kernel
151s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
04-12-2022 12:36
Static task
static1
Behavioral task
behavioral1
Sample
8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe
Resource
win10v2004-20221111-en
General
-
Target
8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe
-
Size
167KB
-
MD5
dfc2b699a1a034febcfcbb7a0896f378
-
SHA1
e7ac60c3078dbf09927898be9c9b9168fdc6a9cf
-
SHA256
8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48
-
SHA512
90204c42ea3fe8f1a6cf894c92bf3697e30aa790a9241c6bf64b75c23f61cda2611e1cb036d40df7d30ecb0fe10200f85289e467c5e8fc8b53c7a322fba9bf2d
-
SSDEEP
3072:98YFaqe9ZjBozEV+Rvq/nFBi14WOZJRHQCiTD8ukbVS1:9BEL9ZFooVcvS7iSpZ3H6D8ukb
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1616 svchest8449.exe -
Loads dropped DLL 4 IoCs
pid Process 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\:\Program Files\Common Files\svchest8449.exe = "C:\\Program Files\\Common Files\\svchest8449.exe" 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe -
Drops file in Program Files directory 3 IoCs
description ioc Process File created C:\Program Files\Common Files\svchest8449.exe 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe File opened for modification C:\Program Files\Common Files\svchest8449.exe 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe File created C:\Program Files\svchest.exe svchest8449.exe -
Kills process with taskkill 2 IoCs
pid Process 1704 taskkill.exe 1236 taskkill.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe 1616 svchest8449.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1704 taskkill.exe Token: SeDebugPrivilege 1236 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1704 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 28 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1836 wrote to memory of 1616 1836 8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe 30 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31 PID 1616 wrote to memory of 1236 1616 svchest8449.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe"C:\Users\Admin\AppData\Local\Temp\8e930603c80b86df1862a04a9369927073f307e486d8ee3e866626e611189c48.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Program Files directory
- Suspicious use of WriteProcessMemory
PID:1836 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe2⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1704
-
-
C:\Program Files\Common Files\svchest8449.exe"C:\Program Files\Common Files\svchest8449.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\SysWOW64\taskkill.exetaskkill /f /im Ksafetray.exe3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:1236
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
31.2MB
MD5df614783769478ce3efa535d499dd00a
SHA1f383383369479ea69f199832be624f1e788b4fe7
SHA25629cc98eb18f503f7841fa149a592251322e7e9e8344b2b55ef3808d918d48db4
SHA5121bfe8a6fc76bcc48450d4f63c1df86683d523988641936806a4baf47b8c4bcf5711ada78c019b23b3bbaf3220cd89b44033523ca9897ebcdeed1fa2f917016cb
-
Filesize
31.2MB
MD5df614783769478ce3efa535d499dd00a
SHA1f383383369479ea69f199832be624f1e788b4fe7
SHA25629cc98eb18f503f7841fa149a592251322e7e9e8344b2b55ef3808d918d48db4
SHA5121bfe8a6fc76bcc48450d4f63c1df86683d523988641936806a4baf47b8c4bcf5711ada78c019b23b3bbaf3220cd89b44033523ca9897ebcdeed1fa2f917016cb
-
Filesize
31.2MB
MD5df614783769478ce3efa535d499dd00a
SHA1f383383369479ea69f199832be624f1e788b4fe7
SHA25629cc98eb18f503f7841fa149a592251322e7e9e8344b2b55ef3808d918d48db4
SHA5121bfe8a6fc76bcc48450d4f63c1df86683d523988641936806a4baf47b8c4bcf5711ada78c019b23b3bbaf3220cd89b44033523ca9897ebcdeed1fa2f917016cb
-
Filesize
31.2MB
MD5df614783769478ce3efa535d499dd00a
SHA1f383383369479ea69f199832be624f1e788b4fe7
SHA25629cc98eb18f503f7841fa149a592251322e7e9e8344b2b55ef3808d918d48db4
SHA5121bfe8a6fc76bcc48450d4f63c1df86683d523988641936806a4baf47b8c4bcf5711ada78c019b23b3bbaf3220cd89b44033523ca9897ebcdeed1fa2f917016cb
-
Filesize
31.2MB
MD5df614783769478ce3efa535d499dd00a
SHA1f383383369479ea69f199832be624f1e788b4fe7
SHA25629cc98eb18f503f7841fa149a592251322e7e9e8344b2b55ef3808d918d48db4
SHA5121bfe8a6fc76bcc48450d4f63c1df86683d523988641936806a4baf47b8c4bcf5711ada78c019b23b3bbaf3220cd89b44033523ca9897ebcdeed1fa2f917016cb
-
Filesize
31.2MB
MD5df614783769478ce3efa535d499dd00a
SHA1f383383369479ea69f199832be624f1e788b4fe7
SHA25629cc98eb18f503f7841fa149a592251322e7e9e8344b2b55ef3808d918d48db4
SHA5121bfe8a6fc76bcc48450d4f63c1df86683d523988641936806a4baf47b8c4bcf5711ada78c019b23b3bbaf3220cd89b44033523ca9897ebcdeed1fa2f917016cb