Analysis
-
max time kernel
143s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230831-en -
resource tags
arch:x64arch:x86image:win10v2004-20230831-enlocale:en-usos:windows10-2004-x64system -
submitted
07-09-2023 21:22
Behavioral task
behavioral1
Sample
2372-1-0x0000000000400000-0x000000000043D000-memory.exe
Resource
win7-20230831-en
windows7-x64
1 signatures
150 seconds
General
-
Target
2372-1-0x0000000000400000-0x000000000043D000-memory.exe
-
Size
244KB
-
MD5
1775fdce5e3ab5f34f4ec41ca7888188
-
SHA1
5e8fbeaf64b53fa1c16598fd60cf00303f64e936
-
SHA256
ea1ca5d3d58a4873760f6f96d84b15f638b9a47a1f13ebdf84f3577e407dada7
-
SHA512
adf85d0a52b9f4bf03e784a2c9fa30eabcfb3dbe29d97d81fbec8fb7702a1475b6c499074d01783fb9f2214f8ee8563a85f84a359caba129000541bf5505d783
-
SSDEEP
3072:Um/E8k9ZjpIL+zNch12KbAwSaSVJSp81b8EG:N/E8k91zz6/tq8EG
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{751C7082-D86F-4CA1-AC3E-C32B89564CA0}.catalogItem svchost.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:1808
-
C:\Users\Admin\AppData\Local\Temp\2372-1-0x0000000000400000-0x000000000043D000-memory.exe"C:\Users\Admin\AppData\Local\Temp\2372-1-0x0000000000400000-0x000000000043D000-memory.exe"1⤵PID:2260