Analysis
-
max time kernel
151s -
max time network
145s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07-01-2024 05:02
Static task
static1
Behavioral task
behavioral1
Sample
4819b7e3cacf32e9a66c3102d34c661a.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4819b7e3cacf32e9a66c3102d34c661a.exe
Resource
win10v2004-20231222-en
General
-
Target
4819b7e3cacf32e9a66c3102d34c661a.exe
-
Size
64KB
-
MD5
4819b7e3cacf32e9a66c3102d34c661a
-
SHA1
e4359b212d28b94c3717116cd9280de2633d651d
-
SHA256
c92484a4db90a84c208565ef3c40fced90648a5a4b03046d4bf7a85e37dfa369
-
SHA512
a4ad10bc08a2a8ff43a7952756900a39f74dc274fde0678dabcd5fc5f3e07e23b0c1218969f8ab3c36be2bbb9b56c54b22103091d47fc7ae6940a9b54f2b6b61
-
SSDEEP
1536:gj2pQQbQqyAf1RnynuvrM66Z18r/GRZF0mOf:M2SQbTn7H41SiZFFO
Malware Config
Signatures
-
Sets DLL path for service in the registry 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\lfmzxq\Parameters\ServiceDll = "%SystemRoot%\\System32\\suhkwp.dll" 4819b7e3cacf32e9a66c3102d34c661a.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\CONTROLSET002\services\lfmzxq\Parameters\ServiceDll = "%SystemRoot%\\System32\\suhkwp.dll" 4819b7e3cacf32e9a66c3102d34c661a.exe Set value (str) \REGISTRY\MACHINE\SYSTEM\CONTROLSET003\Services\lfmzxq\Parameters\ServiceDll = "%SystemRoot%\\System32\\suhkwp.dll" 4819b7e3cacf32e9a66c3102d34c661a.exe -
Deletes itself 1 IoCs
pid Process 2240 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2300 4819b7e3cacf32e9a66c3102d34c661a.exe 2240 svchost.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\SysWOW64\0047855.log 4819b7e3cacf32e9a66c3102d34c661a.exe File created C:\Windows\SysWOW64\suhkwp.dll 4819b7e3cacf32e9a66c3102d34c661a.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 2240 svchost.exe 2240 svchost.exe 2240 svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\4819b7e3cacf32e9a66c3102d34c661a.exe"C:\Users\Admin\AppData\Local\Temp\4819b7e3cacf32e9a66c3102d34c661a.exe"1⤵
- Sets DLL path for service in the registry
- Loads dropped DLL
- Drops file in System32 directory
PID:2300
-
C:\Windows\SysWOW64\svchost.exeC:\Windows\SysWOW64\svchost.exe -k lfmzxq1⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2240
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
93KB
MD51bd6910a1f05afcadcc574cb2676d356
SHA16572d9a9c5b7fa0d28fc2aaf64cf84b66557b07e
SHA25643ebe98e16f8927310b2a454b121d2d1fcd75b351e0fc5f02d86e08d298e7db3
SHA512862609095a7ca438da12de40c2d04b13f5ae9f833c16ea750bcde61ab5e3c4258eb8d54f95b2277d5c1355e176fa1bf77ce3fcd691362c555258134873e4bd21