Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14/01/2024, 12:00
Static task
static1
Behavioral task
behavioral1
Sample
5b2fcb7b669dae8dfc3ac761f3e5b669.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
5b2fcb7b669dae8dfc3ac761f3e5b669.exe
Resource
win10v2004-20231215-en
General
-
Target
5b2fcb7b669dae8dfc3ac761f3e5b669.exe
-
Size
420KB
-
MD5
5b2fcb7b669dae8dfc3ac761f3e5b669
-
SHA1
107897a22cd8c6ba2b33321b2282748cba66688b
-
SHA256
d8681cb9b7eeaf66c5057dea4102bda732fa887debb8495d0784a7921f59c6b5
-
SHA512
8db3486a94eb495c0b14fc3f19383bca85600944db524bb194536cb2a17dfb0b9b837b7e1475f3c0b2d0627b35758d22b3a6c209eae27214e2b18d8ef8e2a6e6
-
SSDEEP
12288:sXukg+ih8FfXhre/8J8BvRYDlhaEbAAOw+:5h8FfXhqg8B2xsl1
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2744 SVCH0ST.EXE -
Writes to the Master Boot Record (MBR) 1 TTPs 2 IoCs
Bootkits write to the MBR to gain persistence at a level below the operating system.
description ioc Process File opened for modification \??\PhysicalDrive0 5b2fcb7b669dae8dfc3ac761f3e5b669.exe File opened for modification \??\PhysicalDrive0 SVCH0ST.EXE -
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\Windows\Temporary Internet Files\counters.dat SVCH0ST.EXE -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\SVCH0ST.EXE 5b2fcb7b669dae8dfc3ac761f3e5b669.exe File opened for modification C:\Windows\SVCH0ST.EXE 5b2fcb7b669dae8dfc3ac761f3e5b669.exe File opened for modification C:\Windows\SVCH0ST.cfg SVCH0ST.EXE File created C:\Windows\SVCH0ST.cfg SVCH0ST.EXE -
Modifies Control Panel 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\International 5b2fcb7b669dae8dfc3ac761f3e5b669.exe Set value (str) \REGISTRY\USER\S-1-5-21-452311807-3713411997-1028535425-1000\Control Panel\International\sDate = "-" 5b2fcb7b669dae8dfc3ac761f3e5b669.exe -
Modifies data under HKEY_USERS 11 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections SVCH0ST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\DefaultConnectionSettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 SVCH0ST.EXE Set value (str) \REGISTRY\USER\.DEFAULT\Control Panel\International\sDate = "-" SVCH0ST.EXE Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings SVCH0ST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodisconnect = 00000000 5b2fcb7b669dae8dfc3ac761f3e5b669.exe Key created \REGISTRY\USER\.DEFAULT\Control Panel\International SVCH0ST.EXE Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Internet Settings SVCH0ST.EXE Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\ProxyEnable = "0" SVCH0ST.EXE Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections\SavedLegacySettings = 4600000002000000090000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 SVCH0ST.EXE Key created \REGISTRY\USER\.Default\Software\Microsoft\Windows\CurrentVersion\Internet Settings 5b2fcb7b669dae8dfc3ac761f3e5b669.exe Set value (data) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\EnableAutodial = 00000000 5b2fcb7b669dae8dfc3ac761f3e5b669.exe -
Modifies registry class 6 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" SVCH0ST.EXE Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key 5b2fcb7b669dae8dfc3ac761f3e5b669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ 5b2fcb7b669dae8dfc3ac761f3e5b669.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ = "regfile" 5b2fcb7b669dae8dfc3ac761f3e5b669.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.key SVCH0ST.EXE Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.key\ SVCH0ST.EXE -
Suspicious behavior: EnumeratesProcesses 29 IoCs
pid Process 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE 2744 SVCH0ST.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\5b2fcb7b669dae8dfc3ac761f3e5b669.exe"C:\Users\Admin\AppData\Local\Temp\5b2fcb7b669dae8dfc3ac761f3e5b669.exe"1⤵
- Writes to the Master Boot Record (MBR)
- Drops file in Windows directory
- Modifies Control Panel
- Modifies data under HKEY_USERS
- Modifies registry class
PID:1616
-
C:\Windows\SVCH0ST.EXEC:\Windows\SVCH0ST.EXE1⤵
- Executes dropped EXE
- Writes to the Master Boot Record (MBR)
- Drops file in System32 directory
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
PID:2744
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
420KB
MD55b2fcb7b669dae8dfc3ac761f3e5b669
SHA1107897a22cd8c6ba2b33321b2282748cba66688b
SHA256d8681cb9b7eeaf66c5057dea4102bda732fa887debb8495d0784a7921f59c6b5
SHA5128db3486a94eb495c0b14fc3f19383bca85600944db524bb194536cb2a17dfb0b9b837b7e1475f3c0b2d0627b35758d22b3a6c209eae27214e2b18d8ef8e2a6e6