Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20231025-en -
resource tags
arch:x64arch:x86image:win7-20231025-enlocale:en-usos:windows7-x64system -
submitted
22-11-2023 01:01
Static task
static1
Behavioral task
behavioral1
Sample
6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe
Resource
win10v2004-20231020-en
General
-
Target
6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe
-
Size
1.1MB
-
MD5
36fee5079bf0163a653ab19789aa76d2
-
SHA1
059bb32e6a779354da693d47d867053407d5d720
-
SHA256
6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3
-
SHA512
fe1d2068847b56bacac132226a47f200612ac326e99ff0c34aaaa7fe1e4ece3a50e4521b996dc2629fc10a23f1e9c0fe378fb50abdde80969250f00228487541
-
SSDEEP
24576:zkEq6Xru36vHi3ubATxjr/AL9d81HuDL/Y7LmtYpD6BaVo2ap:lm3oy/68Vun/5sXo2ap
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe -
Loads dropped DLL 2 IoCs
pid Process 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 816 wrote to memory of 2712 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 28 PID 816 wrote to memory of 2712 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 28 PID 816 wrote to memory of 2712 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 28 PID 816 wrote to memory of 2712 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 28 PID 816 wrote to memory of 2732 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 29 PID 816 wrote to memory of 2732 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 29 PID 816 wrote to memory of 2732 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 29 PID 816 wrote to memory of 2732 816 6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe"C:\Users\Admin\AppData\Local\Temp\6823c34387e255318c32cb43dfd9eb1bcc0300f2c3d5cee7f5dcf518026b89d3.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2712
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2732
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD55611518085f0e601b7af262b73ca1e21
SHA1679e284b4e15030b11e9fcab9e54090f6128c6c2
SHA2568e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab
SHA5120fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc
-
Filesize
753B
MD53686c0005c52832fe31dec142d7038bc
SHA1eab1bfa47ff94b547ba2822cbc25afa372bc2ff3
SHA2568c46df80fa2cc2f12582d27e1ef41745c2211677f7d5d321c391ff05616357d0
SHA5124b600c9bfd8897c20ab5beb21b9dcc0f951e7198cd4bd151a52e54e03ed8706213c189c2cad948aaa974c8cd837563206ca681eb1dfa49e05362cdc9708d1f43
-
Filesize
753B
MD53686c0005c52832fe31dec142d7038bc
SHA1eab1bfa47ff94b547ba2822cbc25afa372bc2ff3
SHA2568c46df80fa2cc2f12582d27e1ef41745c2211677f7d5d321c391ff05616357d0
SHA5124b600c9bfd8897c20ab5beb21b9dcc0f951e7198cd4bd151a52e54e03ed8706213c189c2cad948aaa974c8cd837563206ca681eb1dfa49e05362cdc9708d1f43
-
Filesize
1.1MB
MD53426619dacb8f195281fcc534590e3fe
SHA1dd7d1b834f08d28afd6df3e75b4d3c4bbe04761f
SHA256ca816d21ac8bc4cfbdd1ca50e67a6cdc66edcdcbca5f97f6186b78e651145784
SHA5128c5c14b2142ca71c3731436e63f26805f8f226a868e252ec0e4b36510684b1bff975eba728da49acf63260d30fb1dbeff7face318f2c2949a801a097046f496a
-
Filesize
1.1MB
MD53426619dacb8f195281fcc534590e3fe
SHA1dd7d1b834f08d28afd6df3e75b4d3c4bbe04761f
SHA256ca816d21ac8bc4cfbdd1ca50e67a6cdc66edcdcbca5f97f6186b78e651145784
SHA5128c5c14b2142ca71c3731436e63f26805f8f226a868e252ec0e4b36510684b1bff975eba728da49acf63260d30fb1dbeff7face318f2c2949a801a097046f496a
-
Filesize
1.1MB
MD53426619dacb8f195281fcc534590e3fe
SHA1dd7d1b834f08d28afd6df3e75b4d3c4bbe04761f
SHA256ca816d21ac8bc4cfbdd1ca50e67a6cdc66edcdcbca5f97f6186b78e651145784
SHA5128c5c14b2142ca71c3731436e63f26805f8f226a868e252ec0e4b36510684b1bff975eba728da49acf63260d30fb1dbeff7face318f2c2949a801a097046f496a