Analysis
-
max time kernel
165s -
max time network
177s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 14:24
Static task
static1
Behavioral task
behavioral1
Sample
39b7a9842b4119e44e1d000611091d3d.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
39b7a9842b4119e44e1d000611091d3d.exe
Resource
win10v2004-20231215-en
General
-
Target
39b7a9842b4119e44e1d000611091d3d.exe
-
Size
742KB
-
MD5
39b7a9842b4119e44e1d000611091d3d
-
SHA1
af1f24cd24c5b78b1f73d1bfb2d95fcbc7b8a703
-
SHA256
384aea0d09fffaa60681dcf01e432c156c06d8cb080456661b78c69e8e87414b
-
SHA512
37435308dc6e6eaf46db49d064624aeec873a93a3c60f0a51d79d79d79ce2aaf6d473c3e99a7664b964e138144d237412d1d3789abc7ab5b67d76fd51d258f89
-
SSDEEP
12288:jlt2pp3w+HoIH/P1WTMoccQuvcGXeQu8pCT4JjJu7X3IDQv:ZIpPHoIH/P0HccQuvvu58py4j0n3
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1492 svchost32.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3336304223-2978740688-3645194410-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost32 = "C:\\Windows\\svchost32.exe" svchost32.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\WINDOWS\SVCHOST32.EXE 39b7a9842b4119e44e1d000611091d3d.exe File opened for modification C:\WINDOWS\SVCHOST32.EXE 39b7a9842b4119e44e1d000611091d3d.exe -
Suspicious behavior: EnumeratesProcesses 22 IoCs
pid Process 2204 39b7a9842b4119e44e1d000611091d3d.exe 2204 39b7a9842b4119e44e1d000611091d3d.exe 2204 39b7a9842b4119e44e1d000611091d3d.exe 2204 39b7a9842b4119e44e1d000611091d3d.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe 1492 svchost32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 2204 wrote to memory of 1492 2204 39b7a9842b4119e44e1d000611091d3d.exe 94 PID 2204 wrote to memory of 1492 2204 39b7a9842b4119e44e1d000611091d3d.exe 94 PID 2204 wrote to memory of 1492 2204 39b7a9842b4119e44e1d000611091d3d.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\39b7a9842b4119e44e1d000611091d3d.exe"C:\Users\Admin\AppData\Local\Temp\39b7a9842b4119e44e1d000611091d3d.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\svchost32.exeC:\Windows\svchost32.exe2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:1492
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
742KB
MD539b7a9842b4119e44e1d000611091d3d
SHA1af1f24cd24c5b78b1f73d1bfb2d95fcbc7b8a703
SHA256384aea0d09fffaa60681dcf01e432c156c06d8cb080456661b78c69e8e87414b
SHA51237435308dc6e6eaf46db49d064624aeec873a93a3c60f0a51d79d79d79ce2aaf6d473c3e99a7664b964e138144d237412d1d3789abc7ab5b67d76fd51d258f89