Analysis
-
max time kernel
150s -
max time network
154s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31-01-2024 21:42
Static task
static1
Behavioral task
behavioral1
Sample
8525ab3227cb41306d82cbd390cab141.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8525ab3227cb41306d82cbd390cab141.exe
Resource
win10v2004-20231222-en
General
-
Target
8525ab3227cb41306d82cbd390cab141.exe
-
Size
404KB
-
MD5
8525ab3227cb41306d82cbd390cab141
-
SHA1
3e14d294f95e08717750efac1ea3c9e0eb85f0f9
-
SHA256
c3ceea0c8c8a83004ca4c766d31db127a0e4cab20c234d7c1875774623d81509
-
SHA512
7c752c173595e870a484ae9d3633304a0b6a798da10b89adc37d100d3ca269c6ec1a21afc0555cf47b3a2cf63a990ac63dce5ececfa15c20a5f1bbb5e30c600d
-
SSDEEP
6144:0B092WTUJLAg5FJ0qaAGcpdtlbRG3SU3gjy+3iw/MCTWfyL9fRaw4tUS1WiCHms:MTxAgAcpdVOSAgm+SOSfyL9fMw4tQ
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1344 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2224 8525ab3227cb41306d82cbd390cab141.exe 1344 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3427588347-1492276948-3422228430-1000\Software\Microsoft\Windows\CurrentVersion\RunOnce\Load = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\DwiDesk\\svchost.lnk" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1344 set thread context of 2956 1344 svchost.exe 32 PID 1344 set thread context of 2588 1344 svchost.exe 33 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1344 svchost.exe 2956 RegAsm.exe 2956 RegAsm.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe 2956 RegAsm.exe 1344 svchost.exe 1344 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2588 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 1344 svchost.exe Token: SeDebugPrivilege 2956 RegAsm.exe Token: SeDebugPrivilege 2588 MSBuild.exe Token: 33 2588 MSBuild.exe Token: SeIncBasePriorityPrivilege 2588 MSBuild.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2588 MSBuild.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 2224 wrote to memory of 1344 2224 8525ab3227cb41306d82cbd390cab141.exe 28 PID 2224 wrote to memory of 1344 2224 8525ab3227cb41306d82cbd390cab141.exe 28 PID 2224 wrote to memory of 1344 2224 8525ab3227cb41306d82cbd390cab141.exe 28 PID 2224 wrote to memory of 1344 2224 8525ab3227cb41306d82cbd390cab141.exe 28 PID 1344 wrote to memory of 2564 1344 svchost.exe 29 PID 1344 wrote to memory of 2564 1344 svchost.exe 29 PID 1344 wrote to memory of 2564 1344 svchost.exe 29 PID 1344 wrote to memory of 2564 1344 svchost.exe 29 PID 2564 wrote to memory of 2720 2564 cmd.exe 31 PID 2564 wrote to memory of 2720 2564 cmd.exe 31 PID 2564 wrote to memory of 2720 2564 cmd.exe 31 PID 2564 wrote to memory of 2720 2564 cmd.exe 31 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2956 1344 svchost.exe 32 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33 PID 1344 wrote to memory of 2588 1344 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\8525ab3227cb41306d82cbd390cab141.exe"C:\Users\Admin\AppData\Local\Temp\8525ab3227cb41306d82cbd390cab141.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.exe" -n2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c reg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.lnk" /f3⤵
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Windows\SysWOW64\reg.exereg add "HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\RunOnce" /v "Load" /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\DwiDesk\svchost.lnk" /f4⤵
- Adds Run key to start application
PID:2720
-
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegAsm.exe"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2956
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2588
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
404KB
MD58525ab3227cb41306d82cbd390cab141
SHA13e14d294f95e08717750efac1ea3c9e0eb85f0f9
SHA256c3ceea0c8c8a83004ca4c766d31db127a0e4cab20c234d7c1875774623d81509
SHA5127c752c173595e870a484ae9d3633304a0b6a798da10b89adc37d100d3ca269c6ec1a21afc0555cf47b3a2cf63a990ac63dce5ececfa15c20a5f1bbb5e30c600d