Analysis
-
max time kernel
150s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
14-02-2024 18:47
Static task
static1
Behavioral task
behavioral1
Sample
9c6048ad660972b8b357e8d8e994edd5.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
9c6048ad660972b8b357e8d8e994edd5.exe
Resource
win10v2004-20231222-en
General
-
Target
9c6048ad660972b8b357e8d8e994edd5.exe
-
Size
45KB
-
MD5
9c6048ad660972b8b357e8d8e994edd5
-
SHA1
da01fc2b475dd2e67035d2dadfed532a6bfa905d
-
SHA256
cf6c02293622bc5ac57fba38ef2948b9545e4996e98faf068bfeb6a408ef259e
-
SHA512
22152dad8290c55f4f05d0e5d9cfb3b8994e80b70b487fad0c2b74613374ec047d1c5232479e447df09c9399d1c665e21e678e70ae8c1ea0e74f48015a4fe59e
-
SSDEEP
768:HZsJIDGQ4AdDIQjPMTa809gX2/DpgW1Gr0udA+mPjy6JmNoa+zYgHFbB41nMaz5D:5WlGDIEI09XVg/dA+mLPJmNoa+EgHI1r
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\explorer\run ishost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\run\ishost.exe = "ishost.exe" ishost.exe -
Deletes itself 1 IoCs
pid Process 2812 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1224 ishost.exe 1324 ismon.exe -
Loads dropped DLL 4 IoCs
pid Process 2236 9c6048ad660972b8b357e8d8e994edd5.exe 2236 9c6048ad660972b8b357e8d8e994edd5.exe 1224 ishost.exe 1224 ishost.exe -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\ishost.exe 9c6048ad660972b8b357e8d8e994edd5.exe File opened for modification C:\Windows\SysWOW64\ishost.exe 9c6048ad660972b8b357e8d8e994edd5.exe File created C:\Windows\SysWOW64\ismon.exe ishost.exe File created C:\Windows\SysWOW64\components\flx0.dll ishost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2236 9c6048ad660972b8b357e8d8e994edd5.exe 1224 ishost.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe 1224 ishost.exe 1324 ismon.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2236 9c6048ad660972b8b357e8d8e994edd5.exe -
Suspicious use of UnmapMainImage 1 IoCs
pid Process 2236 9c6048ad660972b8b357e8d8e994edd5.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1224 2236 9c6048ad660972b8b357e8d8e994edd5.exe 28 PID 2236 wrote to memory of 1224 2236 9c6048ad660972b8b357e8d8e994edd5.exe 28 PID 2236 wrote to memory of 1224 2236 9c6048ad660972b8b357e8d8e994edd5.exe 28 PID 2236 wrote to memory of 1224 2236 9c6048ad660972b8b357e8d8e994edd5.exe 28 PID 1224 wrote to memory of 1324 1224 ishost.exe 30 PID 1224 wrote to memory of 1324 1224 ishost.exe 30 PID 1224 wrote to memory of 1324 1224 ishost.exe 30 PID 1224 wrote to memory of 1324 1224 ishost.exe 30 PID 2236 wrote to memory of 2812 2236 9c6048ad660972b8b357e8d8e994edd5.exe 29 PID 2236 wrote to memory of 2812 2236 9c6048ad660972b8b357e8d8e994edd5.exe 29 PID 2236 wrote to memory of 2812 2236 9c6048ad660972b8b357e8d8e994edd5.exe 29 PID 2236 wrote to memory of 2812 2236 9c6048ad660972b8b357e8d8e994edd5.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c6048ad660972b8b357e8d8e994edd5.exe"C:\Users\Admin\AppData\Local\Temp\9c6048ad660972b8b357e8d8e994edd5.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\ishost.exeC:\Windows\system32\ishost.exe2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1224 -
C:\Windows\SysWOW64\ismon.exeC:\Windows\system32\ismon.exe3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1324
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\9C6048~1.EXE > nul2⤵
- Deletes itself
PID:2812
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD59c483866f9db2a6509eb0c06a4707bea
SHA168b47d95cc4eabfd8e12abde495bdf29a0572f31
SHA256a4424a6e2bcb12e7063fd61fa88f658fecc88a46435e9d2c3dfa01e347fe1f77
SHA5125f4eb705593d3f67648d4d01e74d11281ab02e4ab7428f17d50f13a11487d3b2ebeea55a34a4dcb0bd4dbad0e23517c4e5dfa57fd31867649760f57771946680
-
Filesize
27KB
MD5ad12c88d3ffc08b31d3dbd6fe41cf6ad
SHA1b6b996b1e3778ce7d2fe4f30c724736c63cd61e7
SHA2567f5e31da79e7624389b74609e462c87f226dae7c485d635693c3ff8e7a52e54a
SHA5128b47427d7b0c46eff7cc1e1e9ef92225108a218e0a0dfcb9860400ec21ef32bfc2ee9c403d9f1494a63b54fc1518915a720dc2655beb60625c353676970d7f13