Analysis
-
max time kernel
4s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
30-12-2023 13:46
Behavioral task
behavioral1
Sample
1a7ae3f875f7ffc750bb01daf97e1c39.exe
Resource
win7-20231215-en
windows7-x64
12 signatures
150 seconds
General
-
Target
1a7ae3f875f7ffc750bb01daf97e1c39.exe
-
Size
298KB
-
MD5
1a7ae3f875f7ffc750bb01daf97e1c39
-
SHA1
e7f236aef2a9bcd32a337fecf5115ea31dc16b12
-
SHA256
38a76c957f6bbe2a33ef0847b65db45e50e070729f0b71c8f149c4d5668e4683
-
SHA512
97dc551cd5f1c33b8618217a47c7f3b0287bdad8c20b8ac4d1257ccd3645eeffd097836c848aa5f34eaac80eee33212d60dd93379c96c7d98e5a53de8bd8de29
-
SSDEEP
6144:EuIlWqB+ihabs7Ch9KwyF5LeLodp2D1Mmakda0qLqIYu:v6Wq4aaE6KwyF5L0Y2D1PqLl
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" svhost.exe -
Executes dropped EXE 1 IoCs
pid Process 668 svhost.exe -
resource yara_rule behavioral2/memory/4412-0-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/4412-763-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-1322-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-2382-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-3442-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-4502-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-5806-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-6868-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-7930-0x0000000000400000-0x00000000004C2000-memory.dmp upx behavioral2/memory/668-8989-0x0000000000400000-0x00000000004C2000-memory.dmp upx -
Enumerates connected drives 3 TTPs 23 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\j: svhost.exe File opened (read-only) \??\l: svhost.exe File opened (read-only) \??\o: svhost.exe File opened (read-only) \??\y: svhost.exe File opened (read-only) \??\a: svhost.exe File opened (read-only) \??\e: svhost.exe File opened (read-only) \??\i: svhost.exe File opened (read-only) \??\v: svhost.exe File opened (read-only) \??\z: svhost.exe File opened (read-only) \??\m: svhost.exe File opened (read-only) \??\s: svhost.exe File opened (read-only) \??\t: svhost.exe File opened (read-only) \??\x: svhost.exe File opened (read-only) \??\h: svhost.exe File opened (read-only) \??\p: svhost.exe File opened (read-only) \??\r: svhost.exe File opened (read-only) \??\n: svhost.exe File opened (read-only) \??\q: svhost.exe File opened (read-only) \??\u: svhost.exe File opened (read-only) \??\w: svhost.exe File opened (read-only) \??\b: svhost.exe File opened (read-only) \??\g: svhost.exe File opened (read-only) \??\k: svhost.exe -
AutoIT Executable 9 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/4412-763-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-1322-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-2382-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-3442-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-4502-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-5806-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-6868-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-7930-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe behavioral2/memory/668-8989-0x0000000000400000-0x00000000004C2000-memory.dmp autoit_exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\svhost.exe 1a7ae3f875f7ffc750bb01daf97e1c39.exe File opened for modification C:\Windows\Driver.db svhost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 668 svhost.exe 668 svhost.exe 668 svhost.exe 668 svhost.exe 668 svhost.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
pid Process 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe -
Suspicious use of SendNotifyMessage 14 IoCs
pid Process 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 668 svhost.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4412 wrote to memory of 668 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 19 PID 4412 wrote to memory of 668 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 19 PID 4412 wrote to memory of 668 4412 1a7ae3f875f7ffc750bb01daf97e1c39.exe 19
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a7ae3f875f7ffc750bb01daf97e1c39.exe"C:\Users\Admin\AppData\Local\Temp\1a7ae3f875f7ffc750bb01daf97e1c39.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:4412 -
C:\Windows\svhost.exeC:\Windows\svhost.exe2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Enumerates connected drives
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
PID:668
-