Analysis
-
max time kernel
150s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
25-01-2024 03:59
Static task
static1
Behavioral task
behavioral1
Sample
73ae2f529cc85be3df021318041f40fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
73ae2f529cc85be3df021318041f40fe.exe
Resource
win10v2004-20231215-en
General
-
Target
73ae2f529cc85be3df021318041f40fe.exe
-
Size
373KB
-
MD5
73ae2f529cc85be3df021318041f40fe
-
SHA1
37b93f5aabdc32c63ad2cd35f164a26bba9e1294
-
SHA256
62016a398e0047d22414e322488e63e54f714578497e836a49ce64e90494a9ff
-
SHA512
38abadd6ec39f587d21868ba86c89f9746c0b9c35a15e7bc9051b1c17c5ba342f1fa6e83c05ae826fbbda6fb8e7a09a9f0f66d420ce2cd2b7c57fcf015461184
-
SSDEEP
6144:LGFWi0nLzd4VhtV3xfN5fa+Wk/20pP2+T8C7Yi81W4xN6KwKn78VBqqrQ:ji0/d47tV3xVve6P2y77Yb6KPn78jfQ
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" DetoX-HACKS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "Explorer.exe C:\\Windows\\system32\\fservice.exe" services.exe -
Adds policy Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run DetoX-HACKS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" DetoX-HACKS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run services.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\DirectX For Microsoft® Windows = "C:\\Windows\\system32\\fservice.exe" services.exe -
Modifies Installed Components in the registry 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" services.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y} DetoX-HACKS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ DetoX-HACKS.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\StubPath = "C:\\Windows\\system\\sservice.exe" DetoX-HACKS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Active Setup\Installed Components\{5Y99AE78-58TT-11dW-BE53-Y67078979Y}\ services.exe -
resource yara_rule behavioral1/files/0x001900000001490f-41.dat aspack_v212_v242 -
Executes dropped EXE 3 IoCs
pid Process 1680 DetoX-HACKS.exe 2168 fservice.exe 2712 services.exe -
Loads dropped DLL 8 IoCs
pid Process 2336 73ae2f529cc85be3df021318041f40fe.exe 2336 73ae2f529cc85be3df021318041f40fe.exe 1680 DetoX-HACKS.exe 1680 DetoX-HACKS.exe 2712 services.exe 2712 services.exe 2168 fservice.exe 1680 DetoX-HACKS.exe -
resource yara_rule behavioral1/files/0x000900000001225c-2.dat upx behavioral1/memory/2336-3-0x0000000002F30000-0x000000000312C000-memory.dmp upx behavioral1/memory/1680-12-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2168-27-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/files/0x001800000001490f-33.dat upx behavioral1/memory/2712-39-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2168-52-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/1680-62-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-64-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-66-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-67-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-70-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-72-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-74-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-76-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-78-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-80-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-82-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-84-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-86-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-88-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-90-0x0000000000400000-0x00000000005FC000-memory.dmp upx behavioral1/memory/2712-92-0x0000000000400000-0x00000000005FC000-memory.dmp upx -
Modifies WinLogon 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ DetoX-HACKS.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\ services.exe -
Drops file in System32 directory 9 IoCs
description ioc Process File created C:\Windows\SysWOW64\DetoX-HACKS.exe 73ae2f529cc85be3df021318041f40fe.exe File opened for modification C:\Windows\SysWOW64\fservice.exe DetoX-HACKS.exe File created C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\reginv.dll services.exe File created C:\Windows\SysWOW64\fservice.exe services.exe File created C:\Windows\SysWOW64\fservice.exe DetoX-HACKS.exe File opened for modification C:\Windows\SysWOW64\fservice.exe fservice.exe File created C:\Windows\SysWOW64\winkey.dll services.exe File created C:\Windows\SysWOW64\DetoX-HACKS.exe.bat DetoX-HACKS.exe -
Drops file in Windows directory 7 IoCs
description ioc Process File created C:\Windows\system\sservice.exe services.exe File created C:\Windows\system\sservice.exe DetoX-HACKS.exe File opened for modification C:\Windows\system\sservice.exe DetoX-HACKS.exe File created C:\Windows\services.exe fservice.exe File opened for modification C:\Windows\services.exe fservice.exe File created C:\Windows\system\sservice.exe fservice.exe File opened for modification C:\Windows\system\sservice.exe fservice.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe 2712 services.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2712 services.exe 2712 services.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2336 wrote to memory of 1680 2336 73ae2f529cc85be3df021318041f40fe.exe 28 PID 2336 wrote to memory of 1680 2336 73ae2f529cc85be3df021318041f40fe.exe 28 PID 2336 wrote to memory of 1680 2336 73ae2f529cc85be3df021318041f40fe.exe 28 PID 2336 wrote to memory of 1680 2336 73ae2f529cc85be3df021318041f40fe.exe 28 PID 1680 wrote to memory of 2168 1680 DetoX-HACKS.exe 29 PID 1680 wrote to memory of 2168 1680 DetoX-HACKS.exe 29 PID 1680 wrote to memory of 2168 1680 DetoX-HACKS.exe 29 PID 1680 wrote to memory of 2168 1680 DetoX-HACKS.exe 29 PID 2168 wrote to memory of 2712 2168 fservice.exe 30 PID 2168 wrote to memory of 2712 2168 fservice.exe 30 PID 2168 wrote to memory of 2712 2168 fservice.exe 30 PID 2168 wrote to memory of 2712 2168 fservice.exe 30 PID 2712 wrote to memory of 2996 2712 services.exe 31 PID 2712 wrote to memory of 2996 2712 services.exe 31 PID 2712 wrote to memory of 2996 2712 services.exe 31 PID 2712 wrote to memory of 2996 2712 services.exe 31 PID 2712 wrote to memory of 2736 2712 services.exe 32 PID 2712 wrote to memory of 2736 2712 services.exe 32 PID 2712 wrote to memory of 2736 2712 services.exe 32 PID 2712 wrote to memory of 2736 2712 services.exe 32 PID 2996 wrote to memory of 2780 2996 NET.exe 35 PID 2996 wrote to memory of 2780 2996 NET.exe 35 PID 2996 wrote to memory of 2780 2996 NET.exe 35 PID 2996 wrote to memory of 2780 2996 NET.exe 35 PID 2736 wrote to memory of 2560 2736 NET.exe 36 PID 2736 wrote to memory of 2560 2736 NET.exe 36 PID 2736 wrote to memory of 2560 2736 NET.exe 36 PID 2736 wrote to memory of 2560 2736 NET.exe 36 PID 1680 wrote to memory of 2496 1680 DetoX-HACKS.exe 37 PID 1680 wrote to memory of 2496 1680 DetoX-HACKS.exe 37 PID 1680 wrote to memory of 2496 1680 DetoX-HACKS.exe 37 PID 1680 wrote to memory of 2496 1680 DetoX-HACKS.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\73ae2f529cc85be3df021318041f40fe.exe"C:\Users\Admin\AppData\Local\Temp\73ae2f529cc85be3df021318041f40fe.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\DetoX-HACKS.exe"C:\Windows\System32\DetoX-HACKS.exe"2⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1680 -
C:\Windows\SysWOW64\fservice.exeC:\Windows\system32\fservice.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Windows\services.exeC:\Windows\services.exe -XP4⤵
- Modifies WinLogon for persistence
- Adds policy Run key to start application
- Modifies Installed Components in the registry
- Executes dropped EXE
- Loads dropped DLL
- Modifies WinLogon
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Windows\SysWOW64\NET.exeNET STOP srservice5⤵
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP srservice6⤵PID:2780
-
-
-
C:\Windows\SysWOW64\NET.exeNET STOP navapsvc5⤵
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 STOP navapsvc6⤵PID:2560
-
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Windows\SysWOW64\DetoX-HACKS.exe.bat3⤵PID:2496
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
105B
MD586add7cdaae02129f5c4b08dd0dce47d
SHA1bc721be8b7d51d3dee90f8bc60fcc9af7ba4cea7
SHA256cf1f3e2fe9ba13cff848c851e2c91e5c67c81c324bc7b9b9fca18c7c71d54539
SHA5127fe059951b8b74af98a58a78249f9a9f0e4d586a17a59e5e602a5ff460dc5caab9ffcfd2e3a2ea16dcb459049c51d4ff3a85879e53f77345becd4f8bdb320388
-
Filesize
8KB
MD5415bc3d3b4ca95643c2f040cb6d95792
SHA11099f8c8891c8477b03f7d4c7d7855af1011c511
SHA2560887a50ed50eb30db5945acda80223f4d4bee64547c974d0aca296ab48fb043a
SHA512a59e4f99f60083fc44e224d15671e73dde380459336ad1e30eee43fabaa691bb57e636dfd03d4919b179922cea7eacddb4f3076a28f240a64c0b8f64889e6698
-
Filesize
342KB
MD57e58c655c09466daf23d107b5ad481b8
SHA10edc33f0694a4fe70f2028b2b8114fa0592a3204
SHA256f8d7a8108aa4bbc139d314f0b624927e15d205ef3e2592492284f70c5fb83bea
SHA5121ea2f52716c22d3e6b7b3f5dd90fbf55d13a2c99f752e3f670f4ba6261f3b901beafa2dfca600fcb256d5b0baf8d46fc225569459c363951f64e9ce1413101ea
-
Filesize
36KB
MD5562e0d01d6571fa2251a1e9f54c6cc69
SHA183677ad3bc630aa6327253c7b3deffbd4a8ce905
SHA256c5b1d800c86d550c0b68c57c0d9911c1dd21df9e5e37e9e7bc032b5e66fdebe6
SHA512166e132432eca24061f7e7d0c58c0b286e971ae2bc50f7c890b7707dd5dede19fcd83a5f79b6fd3f93dd691e07ad9bc1bd05fe82ccaade1610282188571585ea
-
Filesize
13KB
MD5b4c72da9fd1a0dcb0698b7da97daa0cd
SHA1b25a79e8ea4c723c58caab83aed6ea48de7ed759
SHA25645d266269634ba2de70f179a26d7224111e677e66b38dff2802851b71ce4458f
SHA512f5f184416c5381d275bc093c9275e9fdb35c58e2c401d188aef097950013de6e43269da5d4dd5e7baea34735bd7de664d15fe487b2292fd66926c9845b0cd066