Analysis
-
max time kernel
141s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 22:27
Static task
static1
Behavioral task
behavioral1
Sample
059966a7ee4d76346f99f307a572d319.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
059966a7ee4d76346f99f307a572d319.exe
Resource
win10v2004-20231222-en
General
-
Target
059966a7ee4d76346f99f307a572d319.exe
-
Size
32KB
-
MD5
059966a7ee4d76346f99f307a572d319
-
SHA1
b5088c1bd5c2e819f9987b3ddcbe18ac8cd9cc6c
-
SHA256
2fffd0815462e17abf992e6e5d5fabeed3cfbfd4c18d23ddb164e37a9b1870a2
-
SHA512
5ececdb76ad55efce66121ef065bdb372419b2f0859f38e846628e62f92f13aff13d92a076e48e374dadfa1f84fedb1827518f59e90f7366a6de4178fc1bd2bc
-
SSDEEP
768:4ADe46xgBQOr2fc3r+A0o5nWJDBCG5Ip8PHjuXpBU:4ddxhOr2jA0LJ1CZBU
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\shell = "Explorer.exe C:\\Windows/system32/SVCH0ST.EXE" 059966a7ee4d76346f99f307a572d319.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Agent = "C:\\Windows\\System32\\SVCH0ST.exe" 059966a7ee4d76346f99f307a572d319.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\SVCH0ST.EXE 059966a7ee4d76346f99f307a572d319.exe File opened for modification C:\Windows\SysWOW64\SVCH0ST.EXE 059966a7ee4d76346f99f307a572d319.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1708 059966a7ee4d76346f99f307a572d319.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1708 059966a7ee4d76346f99f307a572d319.exe 1708 059966a7ee4d76346f99f307a572d319.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1708 wrote to memory of 2448 1708 059966a7ee4d76346f99f307a572d319.exe 28 PID 1708 wrote to memory of 2448 1708 059966a7ee4d76346f99f307a572d319.exe 28 PID 1708 wrote to memory of 2448 1708 059966a7ee4d76346f99f307a572d319.exe 28 PID 1708 wrote to memory of 2448 1708 059966a7ee4d76346f99f307a572d319.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\059966a7ee4d76346f99f307a572d319.exe"C:\Users\Admin\AppData\Local\Temp\059966a7ee4d76346f99f307a572d319.exe"1⤵
- Modifies WinLogon for persistence
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Windows\Explorer.exeC:\Windows\Explorer.exe2⤵PID:2448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD5059966a7ee4d76346f99f307a572d319
SHA1b5088c1bd5c2e819f9987b3ddcbe18ac8cd9cc6c
SHA2562fffd0815462e17abf992e6e5d5fabeed3cfbfd4c18d23ddb164e37a9b1870a2
SHA5125ececdb76ad55efce66121ef065bdb372419b2f0859f38e846628e62f92f13aff13d92a076e48e374dadfa1f84fedb1827518f59e90f7366a6de4178fc1bd2bc