Analysis
-
max time kernel
139s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
04-02-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
8f5e361595c824590364e1905f9a4e41.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
8f5e361595c824590364e1905f9a4e41.exe
Resource
win10v2004-20231215-en
General
-
Target
8f5e361595c824590364e1905f9a4e41.exe
-
Size
35KB
-
MD5
8f5e361595c824590364e1905f9a4e41
-
SHA1
07532614ffd292c639894dd0dff015df32edaab1
-
SHA256
f5897a5c5b5cf936cc709a31f469067263f5eeed12c59a07ea2ddbfc9be890f8
-
SHA512
4f019e7b85a3b69554df0c7578485f1424da3b582997173762d35539556de63450b3b74bf64c681c189f749f174122d35d640ff26bd512f92804c98da94718ed
-
SSDEEP
768:KSFa2tn9m9VTXiOjO4ZcfnnknZNuqBkr2SbH5:KSw2XmrTXljORMZTW2y
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\sichost.exe" 8f5e361595c824590364e1905f9a4e41.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation sychost.exe Key value queried \REGISTRY\USER\S-1-5-21-3073191680-435865314-2862784915-1000\Control Panel\International\Geo\Nation 8f5e361595c824590364e1905f9a4e41.exe -
Executes dropped EXE 3 IoCs
pid Process 1428 sovlost.exe 2908 sychost.exe 3272 sichost.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\sovlost.exe 8f5e361595c824590364e1905f9a4e41.exe File opened for modification C:\Windows\SysWOW64\discard.ini 8f5e361595c824590364e1905f9a4e41.exe File created C:\Windows\SysWOW64\Nessery.sys 8f5e361595c824590364e1905f9a4e41.exe File created C:\Windows\SysWOW64\ssdtti.sys 8f5e361595c824590364e1905f9a4e41.exe File created C:\Windows\SysWOW64\sychost.exe 8f5e361595c824590364e1905f9a4e41.exe File created C:\Windows\SysWOW64\sichost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\sichost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\discard.ini sychost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 4 IoCs
pid pid_target Process procid_target 4012 3716 WerFault.exe 83 3640 3716 WerFault.exe 83 2216 3272 WerFault.exe 96 5092 3272 WerFault.exe 96 -
Suspicious behavior: EnumeratesProcesses 38 IoCs
pid Process 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe 3272 sichost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 672 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 3716 8f5e361595c824590364e1905f9a4e41.exe Token: SeSystemtimePrivilege 3272 sichost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 3716 8f5e361595c824590364e1905f9a4e41.exe 3716 8f5e361595c824590364e1905f9a4e41.exe 1428 sovlost.exe 1428 sovlost.exe 2908 sychost.exe 3272 sichost.exe 3272 sichost.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3716 wrote to memory of 1428 3716 8f5e361595c824590364e1905f9a4e41.exe 90 PID 3716 wrote to memory of 1428 3716 8f5e361595c824590364e1905f9a4e41.exe 90 PID 3716 wrote to memory of 1428 3716 8f5e361595c824590364e1905f9a4e41.exe 90 PID 3716 wrote to memory of 2908 3716 8f5e361595c824590364e1905f9a4e41.exe 91 PID 3716 wrote to memory of 2908 3716 8f5e361595c824590364e1905f9a4e41.exe 91 PID 3716 wrote to memory of 2908 3716 8f5e361595c824590364e1905f9a4e41.exe 91 PID 2908 wrote to memory of 3272 2908 sychost.exe 96 PID 2908 wrote to memory of 3272 2908 sychost.exe 96 PID 2908 wrote to memory of 3272 2908 sychost.exe 96
Processes
-
C:\Users\Admin\AppData\Local\Temp\8f5e361595c824590364e1905f9a4e41.exe"C:\Users\Admin\AppData\Local\Temp\8f5e361595c824590364e1905f9a4e41.exe"1⤵
- Modifies WinLogon for persistence
- Checks computer location settings
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3716 -
C:\Windows\SysWOW64\sovlost.exe"C:\Windows\system32\sovlost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428
-
-
C:\Windows\SysWOW64\sychost.exe"C:\Windows\system32\sychost.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Windows\SysWOW64\sichost.exe"C:\Windows\system32\sichost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:3272 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 12964⤵
- Program crash
PID:2216
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3272 -s 13044⤵
- Program crash
PID:5092
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 7602⤵
- Program crash
PID:4012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3716 -s 7682⤵
- Program crash
PID:3640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 3716 -ip 37161⤵PID:2988
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3716 -ip 37161⤵PID:1276
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 496 -p 3272 -ip 32721⤵PID:5048
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 3272 -ip 32721⤵PID:2536
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91B
MD5a5d0e8366838ae4e090914dbdea139a9
SHA15e1342bfb3d3d142835c2584cd31f49604e4508e
SHA2563bb5ff78a77aa2b36925b4a50a50065c5239cb0d88495ad83a6dfb93a9c6b66e
SHA512ee9ac4c5f98932b85f2bbb3b6502d862402b760ed4a78acb6b7051e5dcb99b358401d1f16f89a1c65b0cfbcd4348e952509ed606d371e9d9be8e7565d74fa83a
-
Filesize
26B
MD5d8ab3ea023fda33b8017ccc4748534f8
SHA1e5c8b0f40ed03ad98f0d207ee073af2ee925db78
SHA25614776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab
SHA5120a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0
-
Filesize
35KB
MD58f5e361595c824590364e1905f9a4e41
SHA107532614ffd292c639894dd0dff015df32edaab1
SHA256f5897a5c5b5cf936cc709a31f469067263f5eeed12c59a07ea2ddbfc9be890f8
SHA5124f019e7b85a3b69554df0c7578485f1424da3b582997173762d35539556de63450b3b74bf64c681c189f749f174122d35d640ff26bd512f92804c98da94718ed
-
Filesize
20KB
MD533bb2a692bd2dada7d6f7a574dce9305
SHA1e18ab04b0f3d4cd7c968bd0c0b3b6d1ffd66b96b
SHA256af27d3417da82b642c67a80d6d98f815b9ebf333e8038c9f4446ae598475afb7
SHA512474a626a2d598a9be2cbba06257d5dc9115cf6b099df804a9e7860965dec03df365e4d351088ec04ac6c2d53c047db71007d01ec5e6258e67bd5f20c71195b23
-
Filesize
2KB
MD51e14c892a6d3bd78c5508a13873b9e7b
SHA1a817f4492fd9b0013eda6cb45624af8ce4b04efa
SHA25699cc0877502487b5d58ce9921366fbd299253673c33c8b4d67fc872323dc334e
SHA51211b0393308cb5239c4f0a7c31d6fd09e03c7a623941d1c408f1ab4119ba4089382a57db7a52990009f20ec54eb71dff2aafd6c75a0c17789edabf6f85dd298e6
-
Filesize
20KB
MD5abdb1a784dcaefcbfb8af28599293f4f
SHA1f1601133a072db15d5941628549544771a9a264c
SHA256e7fa8bd434c1ca284b24e16b49ce888523af62dbdffc51325e467807796d12b1
SHA5128880edc42b33d750c731fdb94382edb608df31338bb882179c45b4b6873c168f12ae4854d1b01e2c58f9b56d4003adad6a18f8e5b3312e25a5b6cf7423d709c3