Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 21:44
Behavioral task
behavioral1
Sample
1d6deadad21c2ed17de6e7469e1f54b7.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1d6deadad21c2ed17de6e7469e1f54b7.exe
Resource
win10v2004-20231215-en
General
-
Target
1d6deadad21c2ed17de6e7469e1f54b7.exe
-
Size
109KB
-
MD5
1d6deadad21c2ed17de6e7469e1f54b7
-
SHA1
c62737b8363ca70a0d1eb77d46af188e9b22c167
-
SHA256
e27210644eefd8eb0b47364833eaded4662a95399b51c4c5779d35a985158b32
-
SHA512
e5b73d505ae50f481818b21086e03ded00f9e70be11273c93081dc267c90642b62768012f14f2fd5cacb90b55a072c348c03f681a9e25bfeef056b6e51db3491
-
SSDEEP
3072:fHkULh1nFhJ7ON11AtUBkbqj9myfTMTzUyX/Z:sy1nbJKatZbq63
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svcnost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile svcnost.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications svcnost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\C:\Users\Admin\AppData\Roaming\xoobzyetn2mmymfewito3htgcvyxzjen2\svcnost.exe = "C:\\Users\\Admin\\AppData\\Roaming\\xoobzyetn2mmymfewito3htgcvyxzjen2\\svcnost.exe:*:Enabled:ldrsoft" svcnost.exe -
Loads dropped DLL 2 IoCs
pid Process 1536 svcnost.exe 1536 svcnost.exe -
resource yara_rule behavioral2/memory/4536-0-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4536-1-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4536-3-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4536-4-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4536-5-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/4536-7-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/1536-8-0x0000000000400000-0x00000000004A9000-memory.dmp upx behavioral2/memory/1536-23-0x0000000000400000-0x00000000004A9000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\mssend = "\"C:\\Users\\Admin\\AppData\\Roaming\\xoobzyetn2mmymfewito3htgcvyxzjen2\\svcnost.exe\"" 1d6deadad21c2ed17de6e7469e1f54b7.exe -
Drops desktop.ini file(s) 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\desktop.ini svcnost.exe File opened for modification C:\Users\Admin\AppData\Roaming\desktop.ini svcnost.exe -
description ioc Process Set value (data) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry\SavedLegacySettingsML = 363038383337383337 svcnost.exe Key created \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Internet Explorer\LowRegistry svcnost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4536 1d6deadad21c2ed17de6e7469e1f54b7.exe 4536 1d6deadad21c2ed17de6e7469e1f54b7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 4536 1d6deadad21c2ed17de6e7469e1f54b7.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4536 wrote to memory of 1536 4536 1d6deadad21c2ed17de6e7469e1f54b7.exe 91 PID 4536 wrote to memory of 1536 4536 1d6deadad21c2ed17de6e7469e1f54b7.exe 91 PID 4536 wrote to memory of 1536 4536 1d6deadad21c2ed17de6e7469e1f54b7.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1d6deadad21c2ed17de6e7469e1f54b7.exe"C:\Users\Admin\AppData\Local\Temp\1d6deadad21c2ed17de6e7469e1f54b7.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of WriteProcessMemory
PID:4536 -
C:\Users\Admin\AppData\Roaming\xoobzyetn2mmymfewito3htgcvyxzjen2\svcnost.exe"C:\Users\Admin\AppData\Roaming\xoobzyetn2mmymfewito3htgcvyxzjen2\svcnost.exe"2⤵
- Modifies firewall policy service
- Loads dropped DLL
- Drops desktop.ini file(s)
- Modifies Internet Explorer settings
PID:1536
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
9KB
MD54a27242b307c6a836993353035fafc16
SHA15fea7a41b8f9071848108015d8a952e6f944eea0
SHA25602fd93f64bda51e1e2991184cac13f077d509712e462c9e44be9cf8e22c06de1
SHA51235e9c87642b82df2bf0a9312bb0e9abfb98282db1e34032a4d0150d82c5e2f2e13150ddc896f1e954f02288a1e696a4306ee595b94b1e404c6ec17bac64c44be
-
Filesize
54KB
MD57e8e966927e04a35aec644602b8a9e05
SHA1d201b0b41e8701818d60ddbf9f334332a512c4da
SHA25646f18d9fbf63f378d86962cbf24f5ce57ce257555acd4effdcc41c1e2f1adf5c
SHA512246777c79129a5076b71ca5d3f7e59b06d344f6b5e771892ae8ee68c0b5af9207cd1868b1336b49e6a84665309ad379a33ec6c8e72d7ce41de72153637921a51