Analysis
-
max time kernel
142s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
03/02/2024, 10:40
Static task
static1
Behavioral task
behavioral1
Sample
8c1fd98508ff08117b3606ef3df1c5f9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8c1fd98508ff08117b3606ef3df1c5f9.exe
Resource
win10v2004-20231215-en
General
-
Target
8c1fd98508ff08117b3606ef3df1c5f9.exe
-
Size
418KB
-
MD5
8c1fd98508ff08117b3606ef3df1c5f9
-
SHA1
998dd4c108e218eb912347af50d73eed62f63ce8
-
SHA256
ff7fe52815a4f067620b5f063aad20ea81ff68f85c63a100cae2b42c477b1a8a
-
SHA512
363384ed12920cd003dd1fddb82718fc5fef52eb1d4459a6b248acb518d3f0fa45f0958a104004d54d42720f502957d560580a591aa2bd4db2c31f7bd2143116
-
SSDEEP
6144:cNMUe2TLW5FLFRoi/+zFefn98X+7bzEsToiK:cNMUz+5ZEi/tSMEsToi
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 4 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation 8c1fd98508ff08117b3606ef3df1c5f9.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation svchost32.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation services32.exe Key value queried \REGISTRY\USER\S-1-5-21-996941297-2279405024-2328152752-1000\Control Panel\International\Geo\Nation svchost32.exe -
Executes dropped EXE 4 IoCs
pid Process 1640 svchost32.exe 3112 services32.exe 3356 svchost32.exe 2884 sihost32.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 42 raw.githubusercontent.com 43 raw.githubusercontent.com -
Drops file in System32 directory 4 IoCs
description ioc Process File opened for modification C:\Windows\system32\services32.exe svchost32.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.exe svchost32.exe File created C:\Windows\system32\Microsoft\Telemetry\sihost32.log svchost32.exe File created C:\Windows\system32\services32.exe svchost32.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2888 schtasks.exe 3684 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 1004 powershell.exe 1004 powershell.exe 836 powershell.exe 836 powershell.exe 3984 powershell.exe 3984 powershell.exe 2044 powershell.exe 2044 powershell.exe 1640 svchost32.exe 3348 powershell.exe 3348 powershell.exe 4644 powershell.exe 4644 powershell.exe 4736 powershell.exe 4736 powershell.exe 3432 powershell.exe 3432 powershell.exe 3356 svchost32.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 1004 powershell.exe Token: SeDebugPrivilege 836 powershell.exe Token: SeDebugPrivilege 3984 powershell.exe Token: SeDebugPrivilege 2044 powershell.exe Token: SeDebugPrivilege 1640 svchost32.exe Token: SeDebugPrivilege 3348 powershell.exe Token: SeDebugPrivilege 4644 powershell.exe Token: SeDebugPrivilege 4736 powershell.exe Token: SeDebugPrivilege 3432 powershell.exe Token: SeDebugPrivilege 3356 svchost32.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 4432 wrote to memory of 4396 4432 8c1fd98508ff08117b3606ef3df1c5f9.exe 60 PID 4432 wrote to memory of 4396 4432 8c1fd98508ff08117b3606ef3df1c5f9.exe 60 PID 4396 wrote to memory of 1004 4396 cmd.exe 62 PID 4396 wrote to memory of 1004 4396 cmd.exe 62 PID 4396 wrote to memory of 836 4396 cmd.exe 87 PID 4396 wrote to memory of 836 4396 cmd.exe 87 PID 4396 wrote to memory of 3984 4396 cmd.exe 88 PID 4396 wrote to memory of 3984 4396 cmd.exe 88 PID 4396 wrote to memory of 2044 4396 cmd.exe 89 PID 4396 wrote to memory of 2044 4396 cmd.exe 89 PID 4432 wrote to memory of 2548 4432 8c1fd98508ff08117b3606ef3df1c5f9.exe 98 PID 4432 wrote to memory of 2548 4432 8c1fd98508ff08117b3606ef3df1c5f9.exe 98 PID 2548 wrote to memory of 1640 2548 cmd.exe 99 PID 2548 wrote to memory of 1640 2548 cmd.exe 99 PID 1640 wrote to memory of 4776 1640 svchost32.exe 100 PID 1640 wrote to memory of 4776 1640 svchost32.exe 100 PID 4776 wrote to memory of 2888 4776 cmd.exe 102 PID 4776 wrote to memory of 2888 4776 cmd.exe 102 PID 1640 wrote to memory of 3112 1640 svchost32.exe 109 PID 1640 wrote to memory of 3112 1640 svchost32.exe 109 PID 1640 wrote to memory of 2104 1640 svchost32.exe 108 PID 1640 wrote to memory of 2104 1640 svchost32.exe 108 PID 3112 wrote to memory of 4492 3112 services32.exe 104 PID 3112 wrote to memory of 4492 3112 services32.exe 104 PID 2104 wrote to memory of 1568 2104 cmd.exe 105 PID 2104 wrote to memory of 1568 2104 cmd.exe 105 PID 4492 wrote to memory of 3348 4492 cmd.exe 107 PID 4492 wrote to memory of 3348 4492 cmd.exe 107 PID 4492 wrote to memory of 4644 4492 cmd.exe 110 PID 4492 wrote to memory of 4644 4492 cmd.exe 110 PID 4492 wrote to memory of 4736 4492 cmd.exe 111 PID 4492 wrote to memory of 4736 4492 cmd.exe 111 PID 4492 wrote to memory of 3432 4492 cmd.exe 112 PID 4492 wrote to memory of 3432 4492 cmd.exe 112 PID 3112 wrote to memory of 1932 3112 services32.exe 115 PID 3112 wrote to memory of 1932 3112 services32.exe 115 PID 1932 wrote to memory of 3356 1932 cmd.exe 120 PID 1932 wrote to memory of 3356 1932 cmd.exe 120 PID 3356 wrote to memory of 3108 3356 svchost32.exe 119 PID 3356 wrote to memory of 3108 3356 svchost32.exe 119 PID 3108 wrote to memory of 3684 3108 cmd.exe 118 PID 3108 wrote to memory of 3684 3108 cmd.exe 118 PID 3356 wrote to memory of 2884 3356 svchost32.exe 117 PID 3356 wrote to memory of 2884 3356 svchost32.exe 117 PID 3356 wrote to memory of 3516 3356 svchost32.exe 123 PID 3356 wrote to memory of 3516 3356 svchost32.exe 123 PID 3516 wrote to memory of 2784 3516 cmd.exe 121 PID 3516 wrote to memory of 2784 3516 cmd.exe 121 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"1⤵
- Checks computer location settings
- Suspicious use of WriteProcessMemory
PID:4432 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4396 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1004
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:836
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3984
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2044
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\8c1fd98508ff08117b3606ef3df1c5f9.exe"3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1640 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit4⤵
- Suspicious use of WriteProcessMemory
PID:4776 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'5⤵
- Creates scheduled task(s)
PID:2888
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:2104
-
-
C:\Windows\system32\services32.exe"C:\Windows\system32\services32.exe"4⤵
- Checks computer location settings
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:3112 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"5⤵
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\services32.exe"6⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3356 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"7⤵
- Suspicious use of WriteProcessMemory
PID:3516
-
-
-
-
-
-
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit1⤵
- Suspicious use of WriteProcessMemory
PID:4492 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3348
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4644
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3432
-
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:1568
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"1⤵
- Executes dropped EXE
PID:2884
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"'1⤵
- Creates scheduled task(s)
PID:3684
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "services32" /tr '"C:\Windows\system32\services32.exe"' & exit1⤵
- Suspicious use of WriteProcessMemory
PID:3108
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:2784
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
944B
MD5a9293ef980c925abe33d940554ed8575
SHA19b6d85f2595f7fd4923f52b21ab7607279066969
SHA2568313a191aa9d11cce868d95ac9a9b1609275bfe93131fcb6e547b985b0242fbe
SHA5122003d90bb2bc89378ccaeb9c5edf76b2dfd93c80369d063e56141abb8d7fea6acee6a103874ab227bc1548437269c8e4ee5174bf482ecf3d66c38f3e0ba35d85
-
Filesize
944B
MD515dde0683cd1ca19785d7262f554ba93
SHA1d039c577e438546d10ac64837b05da480d06bf69
SHA256d6fa39eab7ee36f44dc3f9f2839d098433db95c1eba924e4bcf4e5c0d268d961
SHA51257c0e1b87bc1c136f0d39f3ce64bb8f8274a0491e4ca6e45e5c7f9070aa9d9370c6f590ce37cd600b252df2638d870205249a514c43245ca7ed49017024a4672
-
Filesize
944B
MD510fb30dc297f99d6ebafa5fee8b24fa2
SHA176904509313a49a765edcde26b69c3a61f9fa225
SHA256567bcacac120711fc04bf8e6c8cd0bff7b61e8ee0a6316254d1005ebb1264e6a
SHA512c42ace1ea0923fa55592f4f486a508ea56997fdbe0200016b0fc16a33452fc28e4530129a315b3b3a5ede37a07097c13a0eb310c9e91e5d97bb7ce7b955b9498
-
Filesize
944B
MD5d28a889fd956d5cb3accfbaf1143eb6f
SHA1157ba54b365341f8ff06707d996b3635da8446f7
SHA25621e5d7ccf80a293e6ba30ed728846ca19c929c52b96e2c8d34e27cd2234f1d45
SHA5120b6d88deb9be85722e6a78d5886d49f2caf407a59e128d2b4ed74c1356f9928c40048a62731959f2460e9ff9d9feee311043d2a37abe3bb92c2b76a44281478c
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD596e3b86880fedd5afc001d108732a3e5
SHA18fc17b39d744a9590a6d5897012da5e6757439a3
SHA256c3077e4cadb4ed246c02abe55aa6cf832fee4c2546b7addb7d22cd1c7c8c1294
SHA512909b1968f7204fa7029109b02232d8cc5438f6b4dc7c9044e4e47c59fcee538199b13029e36592b12ed573d48a308dd4822d2ced4129ab08d4111897e02be55d
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
117KB
MD5ecd89d73116fb41543ca699f96120672
SHA17efb4beac0cc8a394c22b6eedb424a5d78fea7f5
SHA2565fca8b9a2d38a924fc8df81ca630cad05748fb6d5d260de894b7cde14259b5fb
SHA5125420a07c16162437c484dfdcd5689fc4f2a3ce917663f256dc94dce1b64af85b6611ebf162606f40a160594b71fd737c890017211afc25bf41cc3c67bacc8285
-
Filesize
146KB
MD515a30c4284e3603fe99b392a27785994
SHA11e575ca2470ee1b79687c2303341f5cdfde4f699
SHA256528c60af1078132267b07155d257a47814f954550b098471bf420171a541d5d8
SHA5125cdda69758efd184acae6f18afaf3ae931e6692715bbc045ce5fbd6245278f553bbb33786f0d70cbb3424a66ca9fa38e9b1b8002fccff961d6a87c3264872476
-
Filesize
82KB
MD54285da07c338ff956bc756e0362a0f52
SHA1d4f30d2dc6a9db021d9e7cf2837fe0fa5db092da
SHA256ec00efd258ee41f88958406058378f101c2668f43a803e728be56f72d2af503a
SHA512093edcd5de09e4b53f5046ea4a7fdc2da9fb5504f37f33ce1a76dc1402b8d632a03c32d305d3d02df4b8923317e2451f51250baae341c34425030a8ec5b14e3d
-
Filesize
51KB
MD5082933f6971c052b2635147768940242
SHA172a082d7ac1dcfb2554e2851b297663251a7295d
SHA256b73b3244a431ea995318e07f3786528651a0e6771cd79451a99a889b18f1187d
SHA5126213210955ed3ccecbe93111e73779800a91e23dc1a606c9c8164fb535e4bb329215d775019bf0cd05edb808d5b3af94fdeabf497e25aef6aca57fb7606a7820
-
Filesize
253KB
MD57e92730684cb4d48421b86449c1a643a
SHA1144b0fb062bc3ea134af5c0ffb5b0652659b9354
SHA256535f314ddc17d80af44562cdf69d4e311e811109581044fe6c28016516e4497e
SHA512babfe577fa6caa5549e9b0ee9563baccabe9b9e00ded718e846c6a6838ab82bc0e7590108c179ad3c90b9b285eab5b92e440ac8b919ffe6ec05b4945db3edccc