Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20230831-en -
resource tags
arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system -
submitted
01-09-2023 18:30
Static task
static1
Behavioral task
behavioral1
Sample
37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe
Resource
win10v2004-20230831-en
General
-
Target
37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe
-
Size
1.1MB
-
MD5
1c5acb1b125db47316673a626ff87600
-
SHA1
1037cde50ee950106da8f38994f4999ef7285006
-
SHA256
37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef
-
SHA512
c9b67edf0fc27ca64ccf8341d97ce54d58a53a51a1a3b794dda3a338a98d0a09e7298e0f899e3e5583b6fc03ff8cf6f34f5a624029b8c3b38fe60f41a7a36b0a
-
SSDEEP
24576:4qg8zeKPja85nd0T9RAN0P30mqym6hzsGoRlG4qqjwg1mRWRuH:44zeI/0XqymkulG4qmxmiuH
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe -
Loads dropped DLL 2 IoCs
pid Process 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 3024 wrote to memory of 2684 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 28 PID 3024 wrote to memory of 2684 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 28 PID 3024 wrote to memory of 2684 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 28 PID 3024 wrote to memory of 2684 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 28 PID 3024 wrote to memory of 2672 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 29 PID 3024 wrote to memory of 2672 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 29 PID 3024 wrote to memory of 2672 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 29 PID 3024 wrote to memory of 2672 3024 37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe"C:\Users\Admin\AppData\Local\Temp\37e87d44d8298e607b0aeee2d06f42709e3bc4375033c0e18a7231179a83daef.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2684
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD55611518085f0e601b7af262b73ca1e21
SHA1679e284b4e15030b11e9fcab9e54090f6128c6c2
SHA2568e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab
SHA5120fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc
-
Filesize
753B
MD529da765d992ea979c2f9bafdd6dcb5f2
SHA1ea6f0c4938e9b6632fb38b9e0072bd9854b60e28
SHA2569da468bb26dcdaa47d98040b16d9aa2b258c8d5939f81a71f055c4593ff5775d
SHA512c142bc8be1d352e7fba2badb1dca3c290f326873b597352e33cef3d18c3a565e7cc20bfad7f06fdc054229aa02e4f3952003fe5c8a32aed648be6b396d240ae0
-
Filesize
753B
MD529da765d992ea979c2f9bafdd6dcb5f2
SHA1ea6f0c4938e9b6632fb38b9e0072bd9854b60e28
SHA2569da468bb26dcdaa47d98040b16d9aa2b258c8d5939f81a71f055c4593ff5775d
SHA512c142bc8be1d352e7fba2badb1dca3c290f326873b597352e33cef3d18c3a565e7cc20bfad7f06fdc054229aa02e4f3952003fe5c8a32aed648be6b396d240ae0
-
Filesize
1.1MB
MD58c6ca9605f94e1b93a30dac823faecb0
SHA1dc6f6995021ff282656adf2c34fc3c8bcae9ed0f
SHA256eb668ad5d4931d879c1c11c6f71878c96b2a87254a7ee6d65eaf11a74868bd3a
SHA512adb5fbba1ee1b3c6ee72c02f2e42bd0e4344a8212fa80f8f43912a484b00c85ea5e8bc833a2487421ebcf564fec344094c1d5c84cd3804f2f246080c9db72b38
-
Filesize
1.1MB
MD58c6ca9605f94e1b93a30dac823faecb0
SHA1dc6f6995021ff282656adf2c34fc3c8bcae9ed0f
SHA256eb668ad5d4931d879c1c11c6f71878c96b2a87254a7ee6d65eaf11a74868bd3a
SHA512adb5fbba1ee1b3c6ee72c02f2e42bd0e4344a8212fa80f8f43912a484b00c85ea5e8bc833a2487421ebcf564fec344094c1d5c84cd3804f2f246080c9db72b38
-
Filesize
1.1MB
MD58c6ca9605f94e1b93a30dac823faecb0
SHA1dc6f6995021ff282656adf2c34fc3c8bcae9ed0f
SHA256eb668ad5d4931d879c1c11c6f71878c96b2a87254a7ee6d65eaf11a74868bd3a
SHA512adb5fbba1ee1b3c6ee72c02f2e42bd0e4344a8212fa80f8f43912a484b00c85ea5e8bc833a2487421ebcf564fec344094c1d5c84cd3804f2f246080c9db72b38