Analysis
-
max time kernel
0s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
24/12/2023, 16:59
Static task
static1
Behavioral task
behavioral1
Sample
0706b35653551f23f4a80a3e4ff51b1b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0706b35653551f23f4a80a3e4ff51b1b.exe
Resource
win10v2004-20231215-en
General
-
Target
0706b35653551f23f4a80a3e4ff51b1b.exe
-
Size
45KB
-
MD5
0706b35653551f23f4a80a3e4ff51b1b
-
SHA1
d40e6b9346cf1758a0c8ef7c30f8ba1b9cc016aa
-
SHA256
3a39886474d1c20035b6d6ff316ba949476e6da90092be550b500eed0aed6823
-
SHA512
6a412a5e73f9b6f4bc4d32089d42a37c99d16e072959db8580fdcd7dbc9c8600dcc2aba1ab17983fd0e3480b4386aade84926a915b43a5472f84149a388ebc90
-
SSDEEP
768:E1AuwHyeFo6NPIFAoslbf8eRYLGXdoIFbb5omuKWcbsvwnoT9D88888888888JXi:EOxyeFo6NPCAosxYyXdF5oy3VoKi
Malware Config
Signatures
-
Executes dropped EXE 6 IoCs
pid Process 2044 SVCHOST.EXE 1532 SVCHOST.EXE 3196 SVCHOST.EXE 3676 SVCHOST.EXE 3980 SVCHOST.EXE 3232 SPOOLSV.EXE -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File opened for modification C:\Recycled\desktop.ini 0706b35653551f23f4a80a3e4ff51b1b.exe File opened for modification F:\Recycled\desktop.ini 0706b35653551f23f4a80a3e4ff51b1b.exe -
Enumerates connected drives 3 TTPs 63 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\G: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\I: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\M: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\S: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\U: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\E: SVCHOST.EXE File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\H: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\L: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\Z: SVCHOST.EXE File opened (read-only) \??\O: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\G: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\W: SVCHOST.EXE File opened (read-only) \??\Y: SVCHOST.EXE File opened (read-only) \??\P: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\X: SVCHOST.EXE File opened (read-only) \??\M: SVCHOST.EXE File opened (read-only) \??\R: SVCHOST.EXE File opened (read-only) \??\R: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\Y: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\Z: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\Q: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\I: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\N: SVCHOST.EXE File opened (read-only) \??\T: SVCHOST.EXE File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\K: SVCHOST.EXE File opened (read-only) \??\U: SVCHOST.EXE File opened (read-only) \??\N: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\V: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\H: SVCHOST.EXE File opened (read-only) \??\V: SVCHOST.EXE File opened (read-only) \??\J: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\K: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\Q: SVCHOST.EXE File opened (read-only) \??\T: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\W: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\O: SVCHOST.EXE File opened (read-only) \??\J: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\S: SVCHOST.EXE File opened (read-only) \??\L: SVCHOST.EXE File opened (read-only) \??\P: SVCHOST.EXE File opened (read-only) \??\E: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\X: 0706b35653551f23f4a80a3e4ff51b1b.exe File opened (read-only) \??\W: SVCHOST.EXE -
Drops file in Program Files directory 1 IoCs
description ioc Process File opened for modification C:\Program Files\Microsoft Office\Root\VFS\Windows\Installer\{90160000-000F-0000-1000-0000000FF1CE}\docicon.exe 0706b35653551f23f4a80a3e4ff51b1b.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 22 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\TileInfo = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\QuickTip = "prop:Type;Size" 0706b35653551f23f4a80a3e4ff51b1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\QuickTip = "prop:Type;Size" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" SVCHOST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\Word.Document.8\DefaultIcon\ = "C:\\Program Files\\Microsoft Office\\Root\\VFS\\Windows\\Installer\\{90160000-000F-0000-1000-0000000FF1CE}\\docicon.exe" 0706b35653551f23f4a80a3e4ff51b1b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL 0706b35653551f23f4a80a3e4ff51b1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\shell\open\ 0706b35653551f23f4a80a3e4ff51b1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" 0706b35653551f23f4a80a3e4ff51b1b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG\COMMAND 0706b35653551f23f4a80a3e4ff51b1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\InfoTip = "prop:Type;Write;Size" 0706b35653551f23f4a80a3e4ff51b1b.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\scrfile\ = "Microsoft Word 97 - 2003 Document" SVCHOST.EXE Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\InfoTip = "prop:Type;Write;Size" SVCHOST.EXE Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\CONFIG 0706b35653551f23f4a80a3e4ff51b1b.exe Key deleted \REGISTRY\MACHINE\SOFTWARE\CLASSES\SCRFILE\SHELL\INSTALL\COMMAND 0706b35653551f23f4a80a3e4ff51b1b.exe Set value (str) \REGISTRY\USER\S-1-5-21-1232405761-1209240240-3206092754-1000_Classes\*\TileInfo = "prop:Type;Size" 0706b35653551f23f4a80a3e4ff51b1b.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
pid Process 3968 0706b35653551f23f4a80a3e4ff51b1b.exe 2044 SVCHOST.EXE 1532 SVCHOST.EXE 3196 SVCHOST.EXE 3676 SVCHOST.EXE 3980 SVCHOST.EXE -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 3968 wrote to memory of 2044 3968 0706b35653551f23f4a80a3e4ff51b1b.exe 38 PID 3968 wrote to memory of 2044 3968 0706b35653551f23f4a80a3e4ff51b1b.exe 38 PID 3968 wrote to memory of 2044 3968 0706b35653551f23f4a80a3e4ff51b1b.exe 38 PID 2044 wrote to memory of 1532 2044 SVCHOST.EXE 37 PID 2044 wrote to memory of 1532 2044 SVCHOST.EXE 37 PID 2044 wrote to memory of 1532 2044 SVCHOST.EXE 37 PID 2044 wrote to memory of 3196 2044 SVCHOST.EXE 34 PID 2044 wrote to memory of 3196 2044 SVCHOST.EXE 34 PID 2044 wrote to memory of 3196 2044 SVCHOST.EXE 34 PID 3196 wrote to memory of 3676 3196 SVCHOST.EXE 32 PID 3196 wrote to memory of 3676 3196 SVCHOST.EXE 32 PID 3196 wrote to memory of 3676 3196 SVCHOST.EXE 32 PID 3196 wrote to memory of 3980 3196 SVCHOST.EXE 19 PID 3196 wrote to memory of 3980 3196 SVCHOST.EXE 19 PID 3196 wrote to memory of 3980 3196 SVCHOST.EXE 19 PID 3196 wrote to memory of 3232 3196 SVCHOST.EXE 31 PID 3196 wrote to memory of 3232 3196 SVCHOST.EXE 31 PID 3196 wrote to memory of 3232 3196 SVCHOST.EXE 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\0706b35653551f23f4a80a3e4ff51b1b.exe"C:\Users\Admin\AppData\Local\Temp\0706b35653551f23f4a80a3e4ff51b1b.exe"1⤵
- Drops desktop.ini file(s)
- Enumerates connected drives
- Drops file in Program Files directory
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3968 -
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent2⤵PID:2024
-
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent2⤵PID:468
-
-
C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE"C:\Program Files\Microsoft Office\Root\Office16\WINWORD.EXE" /n "C:\Users\Admin\AppData\Local\Temp\0706b35653551f23f4a80a3e4ff51b1b.doc" /o ""2⤵PID:3800
-
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent2⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044
-
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3980
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent1⤵PID:3132
-
C:\Windows\SysWOW64\Explorer.exeExplorer.exe "C:\recycled\SVCHOST.exe"1⤵PID:1180
-
C:\Windows\explorer.exeC:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding1⤵PID:4120
-
C:\Windows\SysWOW64\userinit.exeC:\Windows\system32\userinit.exe1⤵PID:624
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent1⤵PID:4956
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent1⤵PID:916
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent1⤵PID:4908
-
C:\recycled\SPOOLSV.EXEC:\recycled\SPOOLSV.EXE :agent1⤵
- Executes dropped EXE
PID:3232
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3676
-
F:\recycled\SVCHOST.EXEF:\recycled\SVCHOST.EXE :agent1⤵
- Executes dropped EXE
- Enumerates connected drives
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3196
-
C:\recycled\SVCHOST.EXEC:\recycled\SVCHOST.EXE :agent1⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
45KB
MD57c0ec36fe375f231d5199de5cf9a144a
SHA1faf28016026224165e32b0c3e519f7f974256905
SHA25641b02613c2bf6595db5beb08647166e911bfbd13039de06b7eba811a88c5c342
SHA512524d0b16f38d9c94970ef38ea0e59c2e1cc52a4bc526f65f5b06aa2147e974e1d6d6742b4391d298d28c6c2ede92fe6ac239030f80d67a6e4306f7a182f43793
-
Filesize
43KB
MD52bf41efec941420fafcd540afeb48933
SHA13e70ad0fdeed2a6188df7ae60000dc6ff7197127
SHA256315d338751bf6e8f9dcef3988fee669f1018974547a4f9635f7a6a0b362886d3
SHA512ae36e12cb6e6452f3d6670c8d095a8ee2e22e7ba5e55c09561fae54f5b37d8a727406b1761f6e25982cd1fe16c9d1f3458d008cb33e7282ce7ade668267e59a4
-
Filesize
9KB
MD5b9d8374efb04ed43d106622346112499
SHA1006032bd1daf92f39c31830016f282a4ffe5d1e3
SHA256cf5a4137543819eda306f48842d1f9427ecb3a60685a84d9a1295e8f6795498a
SHA512c480a5b516540e863082ca3179313ed432e91d30a755673a7866d227e221eb4928c8991c5d3bbfeedd33db2ca34832d64113446c10e40e9d10ec81217bf6fbbe
-
Filesize
45KB
MD57f5b7061d75600e4f65eddb5dc1f054b
SHA154c8a68d36d12a528e288b6bb6462f2ee00c1714
SHA256572992eddb5b8762b666788027dced5a28670157ebb50575b9f518a00cc04c73
SHA512bd21c15a793df62e3f01ffa57467920b972bb52463ac8c4424a4fe9a87672ef7415ccc7f3bf851f398066bee5bfd3a24e799b038e3a0f5c06e8eb9096757687f
-
Filesize
42KB
MD54eb491cf015067bb5d8586b4ec3446de
SHA11e3257e711eab67c5a60b6a78bc0e7b8e106e97b
SHA25699dd1b89ea5771eb43e3e3b0482b71471e41945d6c753102dd40f90a3c90d380
SHA51204d421fc134783be25f6ed8e28c9cc0dd5ebccca9eb5d9d519b469bdf6934477ba289b4ce82fa1638a889a7884189d1b6f5e6ec0598ba7e9d99d1b28d0da9963
-
Filesize
65B
MD5ad0b0b4416f06af436328a3c12dc491b
SHA1743c7ad130780de78ccbf75aa6f84298720ad3fa
SHA25623521de51ca1db2bc7b18e41de7693542235284667bf85f6c31902547a947416
SHA512884cd0cae3b31a594f387dae94fc1e0aacb4fd833f8a3368bdec7de0f9f3dc44337c7318895d9549aad579f95de71ff45e1618e75065a04c7894ad1d0d0eac56
-
Filesize
1KB
MD55a0bf3e850311ff23f3a3ab720244caa
SHA1153daffe8e2c70bda27f86a073a04f758aba515c
SHA2564015ade6b749aeae1637aa54a2948c498d3e8cf4837a08f0a3639ed66b9e549f
SHA512a323ad76a5bcbe197269ee17be087117dfa59f1fe4ce4da2d39efc42177e6294961d6d9a4676b26bbe395059d117f5c5d8d4c2415209b01f09176f8626d41af4
-
Filesize
1KB
MD50269b6347e473980c5378044ac67aa1f
SHA1c3334de50e320ad8bce8398acff95c363d039245
SHA25668f5bd85c17975419bb4eacf615286d749bcb951e487813361837580b39ffee2
SHA512e5c525fe688ecd3926ae634a61dc48c4837d7e56aae00b22e4f7d824df804cb536f6df077d5f6c67f63f73832ba00249ed3a75ed40ec9db6e026041b28404d7b
-
Filesize
2B
MD52b9d4fa85c8e82132bde46b143040142
SHA1a02431cf7c501a5b368c91e41283419d8fa9fb03
SHA2564658d6abbbaf7748c172ed5a3e003cdb8997648f88724834e41f75e54520e142
SHA512c37f27b442d578e94db6e5d879d026b0b3457f42b99ec56a9cb6fca3161540a32e207b942ef2ddb7be01fa9245ba4d8c859978a0f9a498c1ad8aa46d0890e6be
-
Filesize
40KB
MD5690abcec03c5f40d3e75cb89264e20d1
SHA1e4ab7f67aeaa2556b7ce6d8f895036c77230053c
SHA25622d41a6ab8f07e677f61d545ddb52d748d1b319715736341d3f9935a39752f79
SHA51232ddf823d30cb6188e378af1b5262be10e41b2c2919c0aa65f20be33dbc09601f050905088b43ea20be670a1722486680b0e93fc7d3d673bfb5675d08aab74b0
-
Filesize
33KB
MD5f6fbfb48617882409e2329e49dc06534
SHA149145b2e4480ff2d4b72d90aeddc477043ea79f3
SHA25650cfd265319bf3ed11f542769212dbbf64dcd1f5a158b60403928a166bf71b7a
SHA5126b5d107c9ed3ad0abdbbbc2c268721aecd7a252a21b025db779865fbe75fb66c5422feb350d768fc54c89deba6b7b977a445da7b5bc9997a517ebffc83df3010
-
Filesize
45KB
MD5317a7643a6f3de736d65a8be16e8d2be
SHA19f0516ba5355af291f7f837309d88ce1b1bc65fa
SHA2564214afaf4a7f58016af419c2f3744659f07343578ed54f87fc60afeb002f33b2
SHA51286f3c2d349e398bf130be6dfb8852dc438a3c83fdb4ea929602adf855ff949957844d277e2cd5e346eec62ea080dcf8d9bbb10c9fed9889cca3d2444ee656660
-
Filesize
34KB
MD57b5a2c1a9490542296ab5ea0b05dfe1a
SHA19e3edbce9536946e784d66ddffa8d1ab55b81ad7
SHA256e7f401f5a0ba60f25f6dfc0da269a497239e80012fa09ab1d3ab8fbe3da2c20b
SHA5123cdf38071e07f376d5363ca74579789db0bf84755ebac3eba1aed07a54b0b7c6795bdac3afe9beb899db956442c1e3ee7dc21bfb199c286d4d2476462596a5e7
-
Filesize
35KB
MD54e426ec352a93f58f1efbcc5d301863f
SHA1f91ce6b0288f29377c760e03951df70995f2bf03
SHA2564d8ceed872a0f90c172982eda9f8fc5889c55115349282b832fefaae884af231
SHA51211612fc6cf2dd23a073ad111b39dd845c717651845381405d0a7d5011af164bda5008dc8c3796ad59a30bb9cd8ac3b63494fc07bbef71f608da88b64ed9e8b7d