Analysis
-
max time kernel
142s -
max time network
146s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13/01/2024, 04:00
Static task
static1
Behavioral task
behavioral1
Sample
57eca3d7ad364e074a20fa0103383825.exe
Resource
win7-20231129-en
General
-
Target
57eca3d7ad364e074a20fa0103383825.exe
-
Size
72KB
-
MD5
57eca3d7ad364e074a20fa0103383825
-
SHA1
f95d257e030f384d0ee334f5692c140cecb2509f
-
SHA256
1d1a61b6bf6307338ecc1c677b93a7c0c85c353421b7b1974f6d07d298095c08
-
SHA512
09cbaeac249a3caccfbf0785500d6632b5b7f359c3c2a214fedac4775a70fa9cbf21f4b04dab8749f7851de1a7f01abba7a7f940e93feaa41453c3dc800d0d3c
-
SSDEEP
1536:gpteExWE/1aLsutLDgcNLCntfblILcVAhzp/BYU:SsxECLDh9CdbuLw6zp/d
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2844 SVCH0ST.COM -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 57eca3d7ad364e074a20fa0103383825.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\7R7YVS.exe 57eca3d7ad364e074a20fa0103383825.exe File opened for modification C:\Windows\7R7YVS.exe 57eca3d7ad364e074a20fa0103383825.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1364 57eca3d7ad364e074a20fa0103383825.exe 1364 57eca3d7ad364e074a20fa0103383825.exe 1364 57eca3d7ad364e074a20fa0103383825.exe 1364 57eca3d7ad364e074a20fa0103383825.exe 1364 57eca3d7ad364e074a20fa0103383825.exe 2844 SVCH0ST.COM 2844 SVCH0ST.COM 2844 SVCH0ST.COM -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 1364 wrote to memory of 2844 1364 57eca3d7ad364e074a20fa0103383825.exe 28 PID 1364 wrote to memory of 2844 1364 57eca3d7ad364e074a20fa0103383825.exe 28 PID 1364 wrote to memory of 2844 1364 57eca3d7ad364e074a20fa0103383825.exe 28 PID 1364 wrote to memory of 2844 1364 57eca3d7ad364e074a20fa0103383825.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\57eca3d7ad364e074a20fa0103383825.exe"C:\Users\Admin\AppData\Local\Temp\57eca3d7ad364e074a20fa0103383825.exe"1⤵
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1364 -
C:\SVCH0ST.COM"C:\SVCH0ST.COM" wb2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
32KB
MD53c1489cf535df31ad83c18482ab3908f
SHA11d2bf1d469742800c26a0b5575fcd77a2a602dc0
SHA2567f89be14cc09351750a7cd48914653d845a768dcabc867c740daa00d3dd99f08
SHA5129927ad6855c1af49fc32d30ab111a2ef3bfa59b3d0cdc13948e1a65e4bb428cd6c6ac49a71676778d1b5f458e78731c1c6cd2d7685d9633566f87ec9db039fee