Overview
overview
10Static
static
71111111111...11.exe
windows7-x64
61111111111...11.exe
windows10-1703-x64
61111111111...11.exe
windows10-2004-x64
69VIcoCiitn.exe
windows7-x64
69VIcoCiitn.exe
windows10-1703-x64
69VIcoCiitn.exe
windows10-2004-x64
1Microsoft Windows.exe
windows7-x64
10Microsoft Windows.exe
windows10-1703-x64
10Microsoft Windows.exe
windows10-2004-x64
10New.exe
windows7-x64
7New.exe
windows10-1703-x64
7New.exe
windows10-2004-x64
7SBLlgcMqPg.exe
windows7-x64
10SBLlgcMqPg.exe
windows10-1703-x64
10SBLlgcMqPg.exe
windows10-2004-x64
10hh.chm
windows7-x64
10hh.chm
windows10-1703-x64
8hh.chm
windows10-2004-x64
8nY4Ke1JkQH.exe
windows7-x64
10nY4Ke1JkQH.exe
windows10-1703-x64
10nY4Ke1JkQH.exe
windows10-2004-x64
10qnr.dll
windows7-x64
3qnr.dll
windows10-1703-x64
3qnr.dll
windows10-2004-x64
3˫װ.exe
windows7-x64
7˫װ.exe
windows10-1703-x64
7˫װ.exe
windows10-2004-x64
7�...װ.exe
windows7-x64
7�...װ.exe
windows10-1703-x64
7�...װ.exe
windows10-2004-x64
7Analysis
-
max time kernel
185s -
max time network
295s -
platform
windows10-1703_x64 -
resource
win10-20230915-en -
resource tags
arch:x64arch:x86image:win10-20230915-enlocale:en-usos:windows10-1703-x64system -
submitted
01-10-2023 09:07
Behavioral task
behavioral1
Sample
1111111111111111111111.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
1111111111111111111111.exe
Resource
win10-20230915-en
Behavioral task
behavioral3
Sample
1111111111111111111111.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral4
Sample
9VIcoCiitn.exe
Resource
win7-20230831-en
Behavioral task
behavioral5
Sample
9VIcoCiitn.exe
Resource
win10-20230915-en
Behavioral task
behavioral6
Sample
9VIcoCiitn.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral7
Sample
Microsoft Windows.exe
Resource
win7-20230831-en
Behavioral task
behavioral8
Sample
Microsoft Windows.exe
Resource
win10-20230915-en
Behavioral task
behavioral9
Sample
Microsoft Windows.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral10
Sample
New.exe
Resource
win7-20230831-en
Behavioral task
behavioral11
Sample
New.exe
Resource
win10-20230915-en
Behavioral task
behavioral12
Sample
New.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral13
Sample
SBLlgcMqPg.exe
Resource
win7-20230831-en
Behavioral task
behavioral14
Sample
SBLlgcMqPg.exe
Resource
win10-20230915-en
Behavioral task
behavioral15
Sample
SBLlgcMqPg.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral16
Sample
hh.chm
Resource
win7-20230831-en
Behavioral task
behavioral17
Sample
hh.chm
Resource
win10-20230915-en
Behavioral task
behavioral18
Sample
hh.chm
Resource
win10v2004-20230915-en
Behavioral task
behavioral19
Sample
nY4Ke1JkQH.exe
Resource
win7-20230831-en
Behavioral task
behavioral20
Sample
nY4Ke1JkQH.exe
Resource
win10-20230915-en
Behavioral task
behavioral21
Sample
nY4Ke1JkQH.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral22
Sample
qnr.dll
Resource
win7-20230831-en
Behavioral task
behavioral23
Sample
qnr.dll
Resource
win10-20230915-en
Behavioral task
behavioral24
Sample
qnr.dll
Resource
win10v2004-20230915-en
Behavioral task
behavioral25
Sample
˫װ.exe
Resource
win7-20230831-en
Behavioral task
behavioral26
Sample
˫װ.exe
Resource
win10-20230915-en
Behavioral task
behavioral27
Sample
˫װ.exe
Resource
win10v2004-20230915-en
Behavioral task
behavioral28
Sample
ٷѰװ.exe
Resource
win7-20230831-en
Behavioral task
behavioral29
Sample
ٷѰװ.exe
Resource
win10-20230831-en
Behavioral task
behavioral30
Sample
ٷѰװ.exe
Resource
win10v2004-20230915-en
General
-
Target
Microsoft Windows.exe
-
Size
1.7MB
-
MD5
48154d5b444c7e235da7be4a0f2ade3a
-
SHA1
57c00c9f26309b28bd4f725adbe2db10dce979e2
-
SHA256
8936302e7140a879dc4ea137692a370f5876b9ccd1a63b9f1d930456b3338ba8
-
SHA512
9e3bf380bb417ca7ae7b5a0986fa3fb1f99dc0d93329557adc17895f273e6bb98e2926ed671c4b566a7c024a15aec58ec575b7c622ed2fb020a49a9c05e2ae45
-
SSDEEP
49152:FjHh/f9vfZryVsqv63smC88jukhTwp1mU9E:tp9vfpWsZcv6uyjE
Malware Config
Signatures
-
Processes:
svchost.execvtres.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" cvtres.exe -
Processes:
svchost.execvtres.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\svchost.exe = "0" svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe = "0" cvtres.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths svchost.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 2836 svchost.exe -
Processes:
svchost.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows Defender\Exclusions\Paths\C:\Users\Admin\AppData\Roaming\svchost.exe = "0" svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
Microsoft Windows.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2713497151-363818805-1301026598-1000\Software\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" Microsoft Windows.exe -
Processes:
svchost.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 2836 set thread context of 784 2836 svchost.exe cvtres.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Delays execution with timeout.exe 1 IoCs
Processes:
timeout.exepid process 3632 timeout.exe -
Suspicious behavior: EnumeratesProcesses 23 IoCs
Processes:
Microsoft Windows.exesvchost.exepowershell.execvtres.exepowershell.exepid process 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 424 Microsoft Windows.exe 2836 svchost.exe 2836 svchost.exe 4380 powershell.exe 784 cvtres.exe 784 cvtres.exe 3448 powershell.exe 4380 powershell.exe 3448 powershell.exe 3448 powershell.exe 4380 powershell.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
Processes:
Microsoft Windows.exesvchost.exepowershell.execvtres.exepowershell.exedescription pid process Token: SeDebugPrivilege 424 Microsoft Windows.exe Token: SeDebugPrivilege 2836 svchost.exe Token: SeDebugPrivilege 4380 powershell.exe Token: SeDebugPrivilege 784 cvtres.exe Token: SeDebugPrivilege 3448 powershell.exe -
Suspicious use of WriteProcessMemory 34 IoCs
Processes:
Microsoft Windows.execmd.execmd.exesvchost.execvtres.exedescription pid process target process PID 424 wrote to memory of 2300 424 Microsoft Windows.exe cmd.exe PID 424 wrote to memory of 2300 424 Microsoft Windows.exe cmd.exe PID 424 wrote to memory of 2300 424 Microsoft Windows.exe cmd.exe PID 424 wrote to memory of 2304 424 Microsoft Windows.exe cmd.exe PID 424 wrote to memory of 2304 424 Microsoft Windows.exe cmd.exe PID 424 wrote to memory of 2304 424 Microsoft Windows.exe cmd.exe PID 2304 wrote to memory of 3632 2304 cmd.exe timeout.exe PID 2304 wrote to memory of 3632 2304 cmd.exe timeout.exe PID 2304 wrote to memory of 3632 2304 cmd.exe timeout.exe PID 2300 wrote to memory of 4984 2300 cmd.exe schtasks.exe PID 2300 wrote to memory of 4984 2300 cmd.exe schtasks.exe PID 2300 wrote to memory of 4984 2300 cmd.exe schtasks.exe PID 2304 wrote to memory of 2836 2304 cmd.exe svchost.exe PID 2304 wrote to memory of 2836 2304 cmd.exe svchost.exe PID 2304 wrote to memory of 2836 2304 cmd.exe svchost.exe PID 2836 wrote to memory of 4380 2836 svchost.exe powershell.exe PID 2836 wrote to memory of 4380 2836 svchost.exe powershell.exe PID 2836 wrote to memory of 4380 2836 svchost.exe powershell.exe PID 2836 wrote to memory of 4500 2836 svchost.exe AddInUtil.exe PID 2836 wrote to memory of 4500 2836 svchost.exe AddInUtil.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 2836 wrote to memory of 784 2836 svchost.exe cvtres.exe PID 784 wrote to memory of 3448 784 cvtres.exe powershell.exe PID 784 wrote to memory of 3448 784 cvtres.exe powershell.exe PID 784 wrote to memory of 3448 784 cvtres.exe powershell.exe PID 784 wrote to memory of 4404 784 cvtres.exe CasPol.exe PID 784 wrote to memory of 4404 784 cvtres.exe CasPol.exe PID 784 wrote to memory of 4404 784 cvtres.exe CasPol.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA = "0" svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Microsoft Windows.exe"C:\Users\Admin\AppData\Local\Temp\Microsoft Windows.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:424 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:4984
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpBEBC.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Windows\SysWOW64\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:3632
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- UAC bypass
- Windows security bypass
- Executes dropped EXE
- Windows security modification
- Checks whether UAC is enabled
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:2836 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\svchost.exe" -Force4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4380
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe"4⤵
- UAC bypass
- Windows security bypass
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:784 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Windows\Microsoft.NET\Framework\v4.0.30319\cvtres.exe" -Force5⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3448
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\CasPol.exe"5⤵PID:4404
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AddInUtil.exe"4⤵PID:4500
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Privilege Escalation
Abuse Elevation Control Mechanism
1Bypass User Account Control
1Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD51c19c16e21c97ed42d5beabc93391fc5
SHA18ad83f8e0b3acf8dfbbf87931e41f0d664c4df68
SHA2561bcd97396c83babfe6c5068ba590d7a3f8b70e72955a9d1e4070648e404cbf05
SHA5127d18776d8f649b3d29c182ff03efc6cea8b527542ee55304980f24577aae8b64e37044407776e220984346c3998ace5f8853afa58c8b38407482a728e9495e0c
-
Filesize
18KB
MD5faa39055dcea49e3dbbe45d74e295480
SHA14503927a845b8de8462b304502d0a1fd2c5f7ec8
SHA256de190f96817941fb555bba9f8db0f0d35f13ad77d9fe21d5670ef1b8296ba781
SHA512aa49ad17618e02e8e3fc9fcff6d986dc67da3c6e2902f7e125af4b491338c60b2b13df0a824c5347ccff0786f13aa15ee2275f2f81389032a4ea71a4a41a3931
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
151B
MD588d134df3eecef1856d634cee9947267
SHA18761fcc8dd9a47ca1f777d9da08fd5fad7c8eae4
SHA256c113d1dbc7503348405fbc8f4221710502667178ab5b7b7e6e7938e7f6c718e0
SHA5121a5291006630169f2457cc041b1782cfaeee42ab93960b579866c2f7e7da350b3cb1628f6ea8d7924c0394e39c0a40fec3bcdc15e34ddb465ef7723233092451
-
Filesize
1.7MB
MD548154d5b444c7e235da7be4a0f2ade3a
SHA157c00c9f26309b28bd4f725adbe2db10dce979e2
SHA2568936302e7140a879dc4ea137692a370f5876b9ccd1a63b9f1d930456b3338ba8
SHA5129e3bf380bb417ca7ae7b5a0986fa3fb1f99dc0d93329557adc17895f273e6bb98e2926ed671c4b566a7c024a15aec58ec575b7c622ed2fb020a49a9c05e2ae45
-
Filesize
1.7MB
MD548154d5b444c7e235da7be4a0f2ade3a
SHA157c00c9f26309b28bd4f725adbe2db10dce979e2
SHA2568936302e7140a879dc4ea137692a370f5876b9ccd1a63b9f1d930456b3338ba8
SHA5129e3bf380bb417ca7ae7b5a0986fa3fb1f99dc0d93329557adc17895f273e6bb98e2926ed671c4b566a7c024a15aec58ec575b7c622ed2fb020a49a9c05e2ae45