Analysis
-
max time kernel
125s -
max time network
203s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 20:26
Behavioral task
behavioral1
Sample
Site Hunter Pro By X-Splinter.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
Site Hunter Pro By X-Splinter.exe
Resource
win10v2004-20230220-en
General
-
Target
Site Hunter Pro By X-Splinter.exe
-
Size
744KB
-
MD5
9a450a05657ce80e73171556154adb60
-
SHA1
9db02ebf6b851397ab6d43d4c79d3785987a56b1
-
SHA256
16d6e1a9844554861f37ac46f86fd1ef618aa56282d83f768c47e1c191dd75ee
-
SHA512
c75444be53b8b55d6634ed8c632b78b523bff5b0ad1eb9171fce65778c6444a7728c11b4137bb397a75f0df635d80083aea380d9708b04a5bf97d0c40965f208
-
SSDEEP
12288:prBjpOUREzLw2f1WrG8HXXQGa3INlTVlRGvk4qOV7l:prBj0+EzLwW1T8HQ93IlTtO
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
Processes:
Setup.exeSetup.exeSite Hunter Pro By X-Splinter .exesvchost.exepid process 1744 Setup.exe 1212 Setup.exe 1760 Site Hunter Pro By X-Splinter .exe 2020 svchost.exe -
Obfuscated with Agile.Net obfuscator 1 IoCs
Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.
Processes:
resource yara_rule behavioral1/memory/1096-54-0x0000000000060000-0x0000000000122000-memory.dmp agile_net -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Setup.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1283023626-844874658-3193756055-1000\Software\Microsoft\Windows\CurrentVersion\Run\Microsoft Corporation Security = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svchost.exe" Setup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
Site Hunter Pro By X-Splinter.exeSetup.exedescription pid process target process PID 1096 wrote to memory of 1744 1096 Site Hunter Pro By X-Splinter.exe Setup.exe PID 1096 wrote to memory of 1744 1096 Site Hunter Pro By X-Splinter.exe Setup.exe PID 1096 wrote to memory of 1744 1096 Site Hunter Pro By X-Splinter.exe Setup.exe PID 1096 wrote to memory of 1212 1096 Site Hunter Pro By X-Splinter.exe Setup.exe PID 1096 wrote to memory of 1212 1096 Site Hunter Pro By X-Splinter.exe Setup.exe PID 1096 wrote to memory of 1212 1096 Site Hunter Pro By X-Splinter.exe Setup.exe PID 1096 wrote to memory of 1760 1096 Site Hunter Pro By X-Splinter.exe Site Hunter Pro By X-Splinter .exe PID 1096 wrote to memory of 1760 1096 Site Hunter Pro By X-Splinter.exe Site Hunter Pro By X-Splinter .exe PID 1096 wrote to memory of 1760 1096 Site Hunter Pro By X-Splinter.exe Site Hunter Pro By X-Splinter .exe PID 1096 wrote to memory of 1760 1096 Site Hunter Pro By X-Splinter.exe Site Hunter Pro By X-Splinter .exe PID 1744 wrote to memory of 2020 1744 Setup.exe svchost.exe PID 1744 wrote to memory of 2020 1744 Setup.exe svchost.exe PID 1744 wrote to memory of 2020 1744 Setup.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Site Hunter Pro By X-Splinter.exe"C:\Users\Admin\AppData\Local\Temp\Site Hunter Pro By X-Splinter.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1744 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svchost.exe"3⤵
- Executes dropped EXE
PID:2020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Setup.exe"C:\Users\Admin\AppData\Local\Temp\Setup.exe"2⤵
- Executes dropped EXE
PID:1212
-
-
C:\Users\Admin\AppData\Local\Temp\Site Hunter Pro By X-Splinter .exe"C:\Users\Admin\AppData\Local\Temp\Site Hunter Pro By X-Splinter .exe"2⤵
- Executes dropped EXE
PID:1760
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
477KB
MD50e6c9432cba1614fccc232f201028c72
SHA16082cf9489faa785c066195f108548e705a6d407
SHA256c9a2faffee3de29e278a89e54b07edb1f520f5e665480a1002d401fd83cde2e8
SHA512c341000eb6f10c3ee1fb722914abb8ba2e1a3ab32a0ccdd92561c0604d58924699d3f9886b8bd03ab13223c9c78eef74045b181520298dba3323a2809c670abb
-
Filesize
477KB
MD50e6c9432cba1614fccc232f201028c72
SHA16082cf9489faa785c066195f108548e705a6d407
SHA256c9a2faffee3de29e278a89e54b07edb1f520f5e665480a1002d401fd83cde2e8
SHA512c341000eb6f10c3ee1fb722914abb8ba2e1a3ab32a0ccdd92561c0604d58924699d3f9886b8bd03ab13223c9c78eef74045b181520298dba3323a2809c670abb
-
Filesize
477KB
MD50e6c9432cba1614fccc232f201028c72
SHA16082cf9489faa785c066195f108548e705a6d407
SHA256c9a2faffee3de29e278a89e54b07edb1f520f5e665480a1002d401fd83cde2e8
SHA512c341000eb6f10c3ee1fb722914abb8ba2e1a3ab32a0ccdd92561c0604d58924699d3f9886b8bd03ab13223c9c78eef74045b181520298dba3323a2809c670abb
-
Filesize
477KB
MD50e6c9432cba1614fccc232f201028c72
SHA16082cf9489faa785c066195f108548e705a6d407
SHA256c9a2faffee3de29e278a89e54b07edb1f520f5e665480a1002d401fd83cde2e8
SHA512c341000eb6f10c3ee1fb722914abb8ba2e1a3ab32a0ccdd92561c0604d58924699d3f9886b8bd03ab13223c9c78eef74045b181520298dba3323a2809c670abb
-
Filesize
250KB
MD52552f20645b607660b68b578f809491a
SHA1358c95c27218925f2a9b3558995129e06ff65ae5
SHA256f1dd801bc8a2d3f476c195034f601d7276f85886d1fcc0a2a79d6d11f309eae3
SHA5122f043d8b7dd4d2a309a717c002f674bf2755c42d74eb73b4509215e0334e749750758a90d1b912e7d6e1b8be4c73ac89d4e015d3694618d7d210734d337a885c
-
Filesize
250KB
MD52552f20645b607660b68b578f809491a
SHA1358c95c27218925f2a9b3558995129e06ff65ae5
SHA256f1dd801bc8a2d3f476c195034f601d7276f85886d1fcc0a2a79d6d11f309eae3
SHA5122f043d8b7dd4d2a309a717c002f674bf2755c42d74eb73b4509215e0334e749750758a90d1b912e7d6e1b8be4c73ac89d4e015d3694618d7d210734d337a885c
-
Filesize
250KB
MD52552f20645b607660b68b578f809491a
SHA1358c95c27218925f2a9b3558995129e06ff65ae5
SHA256f1dd801bc8a2d3f476c195034f601d7276f85886d1fcc0a2a79d6d11f309eae3
SHA5122f043d8b7dd4d2a309a717c002f674bf2755c42d74eb73b4509215e0334e749750758a90d1b912e7d6e1b8be4c73ac89d4e015d3694618d7d210734d337a885c
-
Filesize
339KB
MD5301e8d9a2445dd999ce816c17d8dbbb3
SHA1b91163babeb738bd4d0f577ac764cee17fffe564
SHA2562ea1fa52a6896ce0100084e3696712d76b4d1e995ca0012954bae3107562a9eb
SHA5124941a820d26206fa3e333419622c3b07c8ebdaad51d1c6976df912e9ec123ad39a0c67fb5c3e362658f8463b366892fc4575d4cc2ebe62c2011d10ed5eb6bba3
-
Filesize
339KB
MD5301e8d9a2445dd999ce816c17d8dbbb3
SHA1b91163babeb738bd4d0f577ac764cee17fffe564
SHA2562ea1fa52a6896ce0100084e3696712d76b4d1e995ca0012954bae3107562a9eb
SHA5124941a820d26206fa3e333419622c3b07c8ebdaad51d1c6976df912e9ec123ad39a0c67fb5c3e362658f8463b366892fc4575d4cc2ebe62c2011d10ed5eb6bba3
-
Filesize
339KB
MD5301e8d9a2445dd999ce816c17d8dbbb3
SHA1b91163babeb738bd4d0f577ac764cee17fffe564
SHA2562ea1fa52a6896ce0100084e3696712d76b4d1e995ca0012954bae3107562a9eb
SHA5124941a820d26206fa3e333419622c3b07c8ebdaad51d1c6976df912e9ec123ad39a0c67fb5c3e362658f8463b366892fc4575d4cc2ebe62c2011d10ed5eb6bba3