Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19/12/2023, 15:02
Static task
static1
Behavioral task
behavioral1
Sample
4960873709b36a8b7fb85ed766605d4e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4960873709b36a8b7fb85ed766605d4e.exe
Resource
win10v2004-20231201-en
General
-
Target
4960873709b36a8b7fb85ed766605d4e.exe
-
Size
1.1MB
-
MD5
4960873709b36a8b7fb85ed766605d4e
-
SHA1
8ae792b830869a3bdb36e0e24b9ec4cb2bdad337
-
SHA256
d7dc9b65641f4eba1474e3d50be0f4f64df210a459a7e9cf544c6f81d59830eb
-
SHA512
927ae7a7e640d9100e2a129502069d28cde35c77cbf8620269dbc6d4df723384470fbb1d1f498aadb3d79b50e8f5d3e362d33cbcc32575b98fe377c51d9f97b0
-
SSDEEP
24576:4qg8zeKPja85nd0T9RAN0P30mqym6hzsGoRlG4qqjwg1mRWRuU:44zeI/0XqymkulG4qmxmiuU
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 4960873709b36a8b7fb85ed766605d4e.exe -
Loads dropped DLL 2 IoCs
pid Process 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 4960873709b36a8b7fb85ed766605d4e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1916 4960873709b36a8b7fb85ed766605d4e.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1916 4960873709b36a8b7fb85ed766605d4e.exe 1916 4960873709b36a8b7fb85ed766605d4e.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1916 wrote to memory of 2672 1916 4960873709b36a8b7fb85ed766605d4e.exe 29 PID 1916 wrote to memory of 2672 1916 4960873709b36a8b7fb85ed766605d4e.exe 29 PID 1916 wrote to memory of 2672 1916 4960873709b36a8b7fb85ed766605d4e.exe 29 PID 1916 wrote to memory of 2672 1916 4960873709b36a8b7fb85ed766605d4e.exe 29 PID 1916 wrote to memory of 2652 1916 4960873709b36a8b7fb85ed766605d4e.exe 28 PID 1916 wrote to memory of 2652 1916 4960873709b36a8b7fb85ed766605d4e.exe 28 PID 1916 wrote to memory of 2652 1916 4960873709b36a8b7fb85ed766605d4e.exe 28 PID 1916 wrote to memory of 2652 1916 4960873709b36a8b7fb85ed766605d4e.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\4960873709b36a8b7fb85ed766605d4e.exe"C:\Users\Admin\AppData\Local\Temp\4960873709b36a8b7fb85ed766605d4e.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1916 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2652
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2672
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD55611518085f0e601b7af262b73ca1e21
SHA1679e284b4e15030b11e9fcab9e54090f6128c6c2
SHA2568e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab
SHA5120fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc
-
Filesize
721B
MD5029159ede06595c78d61b01f24e12728
SHA100a1f9ccf137499860eda8b51c93893b907a3912
SHA256cb2cd63de8deed684ba38270803dfc49c6acc8d7703a0b1417385dd9a5bf7bdc
SHA512cf2e18c0ab0095a38f2c6eb16c21ce8f4a096976a3d65a07e8073d010095682fa740224bcae2c02fc03de97c0a90070dd0fe1d02428ffc4481a9756ed5f94ed7
-
Filesize
1.1MB
MD570c430c288b31649de7f29d28d0d7cd5
SHA109c1b8595fcea87df3bfe597ddd0ed38b68f18c9
SHA2568394dfd20957905433db3ebced32ead23cf6845463e03b51864de9f8ca8309b8
SHA512e71aef50ad7879603d50679ceee715bfce92d86a40f617ccd6d67da351cc751bf9fa8309ddd1371e1774d90691d8fb9e47341c3915fdf16713e1d0bbad0545e5