Analysis
-
max time kernel
150s -
max time network
160s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:22
Static task
static1
Behavioral task
behavioral1
Sample
37d5f665081bf379ad8f0d3bcfc9e635.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37d5f665081bf379ad8f0d3bcfc9e635.exe
Resource
win10v2004-20231215-en
General
-
Target
37d5f665081bf379ad8f0d3bcfc9e635.exe
-
Size
210KB
-
MD5
37d5f665081bf379ad8f0d3bcfc9e635
-
SHA1
bd8691e774a4d19887edc7b90095fdd4be13b974
-
SHA256
447a5eb1795278d379b93a14934ed6d27dd931518aacb597e1534eabec5fda17
-
SHA512
993dd2f1f3db22b1ef9fb4440be306bc4efe66594dbc61d425ac3d90dcc16805c58262f97adc9931308c69da2436dfc3bf5cc64994c0c95331753b57ac43849c
-
SSDEEP
3072:J7phzIFu2mciZ4u9Cpb6vIYytbjweflu3VNRzW/wrF9s+Nz9OyD93cHStH7lY385:JtdI+cie4C2vIdZIdk+NB7T7lxtVV
Malware Config
Signatures
-
Modifies firewall policy service 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List svchost.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\AuthorizedApplications\List\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 3024 svchost.exe 2656 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2444714103-3190537498-3629098939-1000\Software\Microsoft\Windows\CurrentVersion\Run\Windows Update System = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" svchost.exe -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 svchost.exe File opened for modification \??\PhysicalDrive0 37d5f665081bf379ad8f0d3bcfc9e635.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2276 set thread context of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 3024 set thread context of 2656 3024 svchost.exe 30 -
Modifies registry class 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 37d5f665081bf379ad8f0d3bcfc9e635.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 37d5f665081bf379ad8f0d3bcfc9e635.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 37d5f665081bf379ad8f0d3bcfc9e635.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" svchost.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 2656 svchost.exe 2656 svchost.exe 2656 svchost.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 3024 svchost.exe 3024 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2276 wrote to memory of 2820 2276 37d5f665081bf379ad8f0d3bcfc9e635.exe 28 PID 2820 wrote to memory of 3024 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 29 PID 2820 wrote to memory of 3024 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 29 PID 2820 wrote to memory of 3024 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 29 PID 2820 wrote to memory of 3024 2820 37d5f665081bf379ad8f0d3bcfc9e635.exe 29 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30 PID 3024 wrote to memory of 2656 3024 svchost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe"C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe"C:\Users\Admin\AppData\Local\Temp\37d5f665081bf379ad8f0d3bcfc9e635.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3024 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Modifies firewall policy service
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2656
-
-
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Create or Modify System Process
1Windows Service
1Pre-OS Boot
1Bootkit
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
210KB
MD537d5f665081bf379ad8f0d3bcfc9e635
SHA1bd8691e774a4d19887edc7b90095fdd4be13b974
SHA256447a5eb1795278d379b93a14934ed6d27dd931518aacb597e1534eabec5fda17
SHA512993dd2f1f3db22b1ef9fb4440be306bc4efe66594dbc61d425ac3d90dcc16805c58262f97adc9931308c69da2436dfc3bf5cc64994c0c95331753b57ac43849c
-
Filesize
128KB
MD5fff8dc998d49cf947c4b390f99202d16
SHA182c9a9d4ce3ebefed1ccfa3d82750e196f1341c0
SHA256438eb4764c395e03c44563ae9cbeaad06ffe07fe6c898d17a5bb02608b92ef63
SHA512042432f6d9b6bd1c53a756a53f6ffa7ffb5aef5f9a560bfda968b689fdd379139d4573d0f310a797056df53546304a53176670c0bfa4fb03c3c0563e266f0c1e
-
Filesize
45KB
MD5c69e9c397dc425e2c7e96087bb3a8c09
SHA179ed4c067019ce9627d56c1d5e1d3ab7c73fd6d7
SHA2569f0974cf66dcc7426ee3a85a54cdbb2faecc7e510a0c5410b58b26be78ce387b
SHA5129df03d9f73714e6c6d4c08d68c19aa0477c152fcec17ca1e0a3e4b3a49267451079c2065a2c6a3bd9ed5c70f92a555ef6f447f7607276508e6ed5d175de53164
-
Filesize
182KB
MD5709faa4a1ef5b3b807e78b16690a165b
SHA19be41f7c8c15814ab8853fd1d9b23525a8d151ad
SHA256e3678462253e9759abd4165464c747aa15233b78e99425d7f6447f2d5bd8de00
SHA512d2dd30d3c150d2ecd8453bde043cad700c5ff1a210b1309f52d716c76c5f9c047500aa022f11ea4d6959db10e6de0d5689d751415b6ba3564f57b2d0e0c13013