Overview
overview
10Static
static
3RtlExUpdt.dll
windows7-x64
1RtlExUpdt.dll
windows10-2004-x64
1WMSysPr6.js
windows7-x64
1WMSysPr6.js
windows10-2004-x64
1svchost.exe
windows7-x64
6svchost.exe
windows10-2004-x64
6windows.dll
windows7-x64
3windows.dll
windows10-2004-x64
3winhelp.bat
windows7-x64
1winhelp.bat
windows10-2004-x64
1winhlp32.cmd
windows7-x64
10winhlp32.cmd
windows10-2004-x64
10Analysis
-
max time kernel
141s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
12/02/2024, 23:28
Static task
static1
Behavioral task
behavioral1
Sample
RtlExUpdt.dll
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
RtlExUpdt.dll
Resource
win10v2004-20231215-en
Behavioral task
behavioral3
Sample
WMSysPr6.js
Resource
win7-20231215-en
Behavioral task
behavioral4
Sample
WMSysPr6.js
Resource
win10v2004-20231215-en
Behavioral task
behavioral5
Sample
svchost.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
svchost.exe
Resource
win10v2004-20231215-en
Behavioral task
behavioral7
Sample
windows.dll
Resource
win7-20231215-en
Behavioral task
behavioral8
Sample
windows.dll
Resource
win10v2004-20231222-en
Behavioral task
behavioral9
Sample
winhelp.bat
Resource
win7-20231215-en
Behavioral task
behavioral10
Sample
winhelp.bat
Resource
win10v2004-20231222-en
Behavioral task
behavioral11
Sample
winhlp32.cmd
Resource
win7-20231215-en
Behavioral task
behavioral12
Sample
winhlp32.cmd
Resource
win10v2004-20231215-en
General
-
Target
svchost.exe
-
Size
1.6MB
-
MD5
d7dd4e50ceb8ed99af2f22deea20dc01
-
SHA1
e27773eb161df7114e9342375397e60fedf60a57
-
SHA256
c9594974db1be34b6694f0d1e94fc5130a3668d41cdbc003e0a6547b2b4fa8d2
-
SHA512
7d36b63a4acd94f5be946eddfbdecf303c0cc53b6550df9d5af80b02c9a3a8046a9402493d12f51375cc9dbb0ecbacd0137832b5cfc69bd2a50e98f8fd5c0ce0
-
SSDEEP
24576:0vDia9o++f3uEvDGcG5qE9WerjSLWJtV54r2TYm6rohV:07iaMukA5qmJOr5m
Malware Config
Signatures
-
Checks installed software on the system 1 TTPs
Looks up Uninstall key entries in the registry to enumerate software on the system.
-
Modifies registry class 40 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\DefaultIcon svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Topic svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\ = "URL:IRC Protocol" svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ifexec\ = "%1" svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\Application svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.cha\ = "ChatFile" svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\DefaultIcon\ = "\"c:\\users\\admin\\appdata\\local\\temp\\svchost.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec\ifexec svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Topic\ = "Connect" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.chat\ = "ChatFile" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon\ = "\"c:\\users\\admin\\appdata\\local\\temp\\svchost.exe\"" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Application\ = "xiRCon" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\ = "%1" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.chat svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\ = "Chat File" svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\Topic\ = "Connect" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ifexec\ = "%1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\URL Protocol svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\command\ = "\"c:\\users\\admin\\appdata\\local\\temp\\svchost.exe\"" svchost.exe Key created \REGISTRY\MACHINE\Software\Classes\irc\Shell\open\ddeexec svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.cha svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\DefaultIcon svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\ddeexec\ = "%1" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\Shell\open\ddeexec\Application\ = "xiRCon" svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\ChatFile\Shell\open\command\ = "\"c:\\users\\admin\\appdata\\local\\temp\\svchost.exe\"" svchost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\irc\EditFlags = 02000000 svchost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\irc svchost.exe -
Suspicious use of FindShellTrayWindow 3 IoCs
pid Process 4644 svchost.exe 4644 svchost.exe 4644 svchost.exe -
Suspicious use of SendNotifyMessage 3 IoCs
pid Process 4644 svchost.exe 4644 svchost.exe 4644 svchost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 4644 svchost.exe 4644 svchost.exe
Processes
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD563cf09be027d0d14daa09db9ab2a49fa
SHA1ce9dcfb697535eccbc76de118d4cd5a63cd20689
SHA256019ae637ec9e68fc33174bdb64ae8796f706ed88e7a829e3fc0abdff5c1b2729
SHA512f5df6848783d8d980b1d865645ac4988ab64d2ddf6f2f659bf4d6a4dd46a7b60e73527e738158d95c37d851b984d95787d38d7471b73a4248f718de862090aea
-
Filesize
2KB
MD5330c97c8f25fb6b012dcba152f7927ee
SHA12a82bbe80eb0a26d6e9004a5ff2a1049db83ef61
SHA256c0a919fd85b9f8fb3ed8a21f7c5319780a3d47280f376f6e3189318bbd00d358
SHA51252eac6b600ce1ca2a3ecd186230535ee13206e740d8fdfa413c179cef4b3bf68c9e97b74f417f387ab6db9cb90b3faca9e20f0d6320b5c3fc1652f8b9b4f7615
-
Filesize
2KB
MD5e3de32d318a77933730243142d96fd39
SHA1834289ec10bf12c5dde84efc6c532eb71712af11
SHA256f9857a3e4c908ef012c540342d8548be8d73102211417e2c8401d2cba8ca3554
SHA512e2e2cb3f412c4a3358b1767ecd60dd854c473735cd173effe9a458a62f4d426702835cb842d4f64223a1bdcaf41c11c0fff857899d55e463304f624b34b4b49f
-
Filesize
2KB
MD51a5154a31b5c6ebcc3708f650fcb917e
SHA13da154088667469c4c791d46c1beee2bd4d24105
SHA2560c2f29e4d57b532aa73eeb764d2581585f6faf53ed43e7f16b8542b112022395
SHA51220d8469f5f4304cc631b6a50bf95d1a33cf7ef0059c00495505b11de0058c5b380fbbeb5f55163abc617f38ae2b016c6d2476cfd80ebd53a8da2e6ed65eb4969
-
Filesize
2KB
MD504bbb2c8a5c3c7c23d605af408057bb8
SHA1bb99df7958301ba9e9547d8a1c55aac69d389409
SHA25661f729802c277744f4b8df7c96b1f4f2a1e8d4115bede4c5d1396e9b7d375a80
SHA51254965646672a7935a1b1f94a7149d12c594ccbc437e57d4e5a15fc213c49ff1bbb010748d34373da73f9c49309482454329b14e2a7e08703771d977640c5a38c