Analysis
-
max time kernel
140s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 07:08
Static task
static1
Behavioral task
behavioral1
Sample
5a993a09c6e73b996fdafa05cc3f8122.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5a993a09c6e73b996fdafa05cc3f8122.exe
Resource
win10v2004-20231222-en
General
-
Target
5a993a09c6e73b996fdafa05cc3f8122.exe
-
Size
63KB
-
MD5
5a993a09c6e73b996fdafa05cc3f8122
-
SHA1
9bd4d9ed6916796b749806020ec99879bd507f4c
-
SHA256
7127dba998c2fc80e2e9fdea9cd271de4327bfee850c55145cf917c0dcea4843
-
SHA512
79b9047f5050690b74215e5069f75852d8e7f8d5166eee1f4bd01b14ca7f4638e85bc7bb4b0b68246ae3a95e2713528f43be305553715fa17ed32fbb5c45bf1d
-
SSDEEP
1536:93LAMoJxnqiAna+uNgflub3IueuGtnyX7dwMnSr1WTTwfz:RAMovcna+uNB3bGsXtSWT6
Malware Config
Signatures
-
Deletes itself 1 IoCs
pid Process 2964 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 2932 svohcst.exe 1372 svohcst.exe -
Loads dropped DLL 3 IoCs
pid Process 2964 cmd.exe 2964 cmd.exe 2932 svohcst.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Download = "C:\\Users\\Admin\\AppData\\Local\\Temp\\svohcst.exe" svohcst.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 2352 5a993a09c6e73b996fdafa05cc3f8122.exe 2220 5a993a09c6e73b996fdafa05cc3f8122.exe 2932 svohcst.exe 1372 svohcst.exe -
Suspicious behavior: EnumeratesProcesses 14 IoCs
pid Process 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe 1372 svohcst.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 2352 wrote to memory of 2220 2352 5a993a09c6e73b996fdafa05cc3f8122.exe 20 PID 2352 wrote to memory of 2220 2352 5a993a09c6e73b996fdafa05cc3f8122.exe 20 PID 2352 wrote to memory of 2220 2352 5a993a09c6e73b996fdafa05cc3f8122.exe 20 PID 2352 wrote to memory of 2220 2352 5a993a09c6e73b996fdafa05cc3f8122.exe 20 PID 2220 wrote to memory of 2964 2220 5a993a09c6e73b996fdafa05cc3f8122.exe 24 PID 2220 wrote to memory of 2964 2220 5a993a09c6e73b996fdafa05cc3f8122.exe 24 PID 2220 wrote to memory of 2964 2220 5a993a09c6e73b996fdafa05cc3f8122.exe 24 PID 2220 wrote to memory of 2964 2220 5a993a09c6e73b996fdafa05cc3f8122.exe 24 PID 2964 wrote to memory of 2932 2964 cmd.exe 23 PID 2964 wrote to memory of 2932 2964 cmd.exe 23 PID 2964 wrote to memory of 2932 2964 cmd.exe 23 PID 2964 wrote to memory of 2932 2964 cmd.exe 23 PID 2932 wrote to memory of 1372 2932 svohcst.exe 22 PID 2932 wrote to memory of 1372 2932 svohcst.exe 22 PID 2932 wrote to memory of 1372 2932 svohcst.exe 22 PID 2932 wrote to memory of 1372 2932 svohcst.exe 22
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a993a09c6e73b996fdafa05cc3f8122.exe"C:\Users\Admin\AppData\Local\Temp\5a993a09c6e73b996fdafa05cc3f8122.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\5a993a09c6e73b996fdafa05cc3f8122.exeC:\Users\Admin\AppData\Local\Temp\5a993a09c6e73b996fdafa05cc3f8122.exe2⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\run.bat3⤵
- Deletes itself
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\svohcst.exeC:\Users\Admin\AppData\Local\Temp\svohcst.exe1⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1372
-
C:\Users\Admin\AppData\Local\Temp\svohcst.exe"C:\Users\Admin\AppData\Local\Temp\svohcst.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of WriteProcessMemory
PID:2932
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD5ac05d27423a85adc1622c714f2cb6184
SHA1b0fe2b1abddb97837ea0195be70ab2ff14d43198
SHA256c6456e12e5e53287a547af4103e0397cb9697e466cf75844312dc296d43d144d
SHA5126d0ef9050e41fbae680e0e59dd0f90b6ac7fea5579ef5708b69d5da33a0ece7e8b16574b58b17b64a34cc34a4ffc22b4a62c1ece61f36c4a11a0665e0536b90d
-
Filesize
1KB
MD5a266bb7dcc38a562631361bbf61dd11b
SHA13b1efd3a66ea28b16697394703a72ca340a05bd5
SHA256df545bf919a2439c36983b54cdfc903dfa4f37d3996d8d84b4c31eec6f3c163e
SHA5120da8ef4f8f6ed3d16d2bc8eb816b9e6e1345dfe2d91160196c47e6149a1d6aedaafadcefd66acdea7f72dcf0832770192ceac15b0c559c4ccc2c0e5581d5aefc
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F0ACCF77CDCBFF39F6191887F6D2D357
Filesize242B
MD59383f0a06d3b82764d375f5e724b2e27
SHA15305f5ee5553ce6da5131b6fbaf6176ccd014367
SHA256bd085dfe1834fa124911ef7d83b143417419692ae7aea9bbba93dced66d80a3d
SHA512093af3db7ab0fbc1c1434b623e0562792411252315b66a402527223f130eb4ca73588d5a9acc6d2d0a61b132732127feff5545ebc4afa17c8bafcd06734e4e4c
-
Filesize
171KB
MD59c0c641c06238516f27941aa1166d427
SHA164cd549fb8cf014fcd9312aa7a5b023847b6c977
SHA2564276af3669a141a59388bc56a87f6614d9a9bdddf560636c264219a7eb11256f
SHA512936ed0c0b0a7ff8e606b1cc4175a1f9b3699748ccbba1c3aff96203033d2e9edabf090e5148370df42fbfc4e31d7229493706ff24f19ff42ff7bef74a6baad06
-
Filesize
238B
MD577fbf41066105a4899d49459deee9dd7
SHA1504b0d8d819b7407f2fc762fb028dc7054ef4532
SHA256e72b42549d938df105157e7b286bce3cd73c68f3e18f8175fad27756efa157c5
SHA5122a3dd1c57e204e88f5e25f05d8920b539baca058b9f18534cca8121c2735c1f6d3fa663a1f40f119e1d55fef6b51d5c1d46535e0240e0d94dd439bc8d350f267
-
Filesize
63KB
MD55a993a09c6e73b996fdafa05cc3f8122
SHA19bd4d9ed6916796b749806020ec99879bd507f4c
SHA2567127dba998c2fc80e2e9fdea9cd271de4327bfee850c55145cf917c0dcea4843
SHA51279b9047f5050690b74215e5069f75852d8e7f8d5166eee1f4bd01b14ca7f4638e85bc7bb4b0b68246ae3a95e2713528f43be305553715fa17ed32fbb5c45bf1d