Analysis
-
max time kernel
165s -
max time network
171s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 10:08
Behavioral task
behavioral1
Sample
1565233edb010c411fa2b589ab17e7fa.exe
Resource
win7-20231215-en
General
-
Target
1565233edb010c411fa2b589ab17e7fa.exe
-
Size
298KB
-
MD5
1565233edb010c411fa2b589ab17e7fa
-
SHA1
e942c0e4be496bf1d05e710e4da42d90b1ee7247
-
SHA256
32f3a7352718d199e40fc6347c4f6d5e0474377900b659ed331b94dada47963f
-
SHA512
313246658be47a3750ed4f130836bb911a398ff3019fc15c4c212f9426947f23b750072fd1927a22b0f39c20cc9edfced034700ae50fe6c47b9ca211c2447ea9
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYb:v6Wq4aaE6KwyF5L0Y2D1PqLe
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 3720 svhost.exe -
resource yara_rule behavioral2/memory/2896-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x00070000000231fa-3.dat upx behavioral2/memory/3720-5-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/files/0x0006000000023206-85.dat upx behavioral2/memory/2896-86-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-528-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-1557-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-1815-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-2599-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-3623-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-4910-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-5919-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-6614-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-7238-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-8534-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-9551-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-10466-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-11494-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-12773-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/3720-13811-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\k: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\e: svhost.exe -
AutoIT Executable 16 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/2896-86-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-528-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-1557-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-1815-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-2599-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-3623-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-4910-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-5919-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-6614-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-7238-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-8534-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-9551-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-10466-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-11494-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-12773-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/3720-13811-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 1565233edb010c411fa2b589ab17e7fa.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 2896 1565233edb010c411fa2b589ab17e7fa.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3720 svhost.exe -
Suspicious use of FindShellTrayWindow 64 IoCs
pid Process 2896 1565233edb010c411fa2b589ab17e7fa.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe -
Suspicious use of SendNotifyMessage 64 IoCs
pid Process 2896 1565233edb010c411fa2b589ab17e7fa.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 2896 1565233edb010c411fa2b589ab17e7fa.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe 3720 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2896 wrote to memory of 3720 2896 1565233edb010c411fa2b589ab17e7fa.exe 90 PID 2896 wrote to memory of 3720 2896 1565233edb010c411fa2b589ab17e7fa.exe 90 PID 2896 wrote to memory of 3720 2896 1565233edb010c411fa2b589ab17e7fa.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\1565233edb010c411fa2b589ab17e7fa.exe"C:\Users\Admin\AppData\Local\Temp\1565233edb010c411fa2b589ab17e7fa.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2896 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:3720
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
82B
MD5c2d2dc50dca8a2bfdc8e2d59dfa5796d
SHA17a6150fc53244e28d1bcea437c0c9d276c41ccad
SHA256b2d38b3f122cfcf3cecabf0dfe2ab9c4182416d6961ae43f1eebee489cf3c960
SHA5126cfdd08729de9ee9d1f5d8fcd859144d32ddc0a9e7074202a7d03d3795bdf0027a074a6aa54f451d4166024c134b27c55c7142170e64d979d86c13801f937ce4
-
Filesize
298KB
MD5e547d4c9b039f78d1ce683d6aff60885
SHA156a691c079a0ca58108635b819eeb0dc307a748a
SHA256a1f1fafb91f6e7607e83f0ca5139b301703ef6d94c79ffe29e79ea3a3609ac31
SHA5121f9529732394ba90ccab51e6842bb6812334da0dd364cdc698dcef3a6aed496a96daa3f58dca517a576c80fb45affb368ae5cf7fc92167de622fa45fb41295d6
-
Filesize
298KB
MD54ece987b0795fd8dccb0fc70d25baf2a
SHA1d0ba8859f93b4e74fb55ef23964174d6b52a0f62
SHA256a25702e636adf2366fc3d63a132c1e126dc50703f38db1037fd1f7b283d2592b
SHA5125915ca93ede0bda1b9591cf6e48d7a4ff1b298068596ecc33d831209ab13f95943dbe3508360a44f528116f37fa33c661de9d9aa8b472a42b34d096383a1fdaf