Analysis
-
max time kernel
150s -
max time network
141s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
23/02/2024, 02:33
Static task
static1
Behavioral task
behavioral1
Sample
0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe
Resource
win10v2004-20240221-en
General
-
Target
0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe
-
Size
1.1MB
-
MD5
e8f5f42d38b510e9cba13f9e4d3814e6
-
SHA1
2e88cd68b913dfee743ebc20a85d8bf11162f93b
-
SHA256
0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37
-
SHA512
899cc8a94a67ed44e62559fc5fb41d548431cc404c6dce9789440c7683bb43b9694f2cef658d9ddb863a95d4cd79be4a9c640c27f6a31c49c0dd474e2c0aa39a
-
SSDEEP
24576:4qg8zeKPja85nd0T9RAN0P30mqym6hzsGoRlG4qqjwg1mRWRuV:44zeI/0XqymkulG4qmxmiuV
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe -
Loads dropped DLL 2 IoCs
pid Process 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1648 wrote to memory of 2520 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 28 PID 1648 wrote to memory of 2520 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 28 PID 1648 wrote to memory of 2520 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 28 PID 1648 wrote to memory of 2520 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 28 PID 1648 wrote to memory of 3044 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 29 PID 1648 wrote to memory of 3044 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 29 PID 1648 wrote to memory of 3044 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 29 PID 1648 wrote to memory of 3044 1648 0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe"C:\Users\Admin\AppData\Local\Temp\0619016866996d25027a3305331f832e6044f196620dbeed68feb2cfb68bea37.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2520
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:3044
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD55611518085f0e601b7af262b73ca1e21
SHA1679e284b4e15030b11e9fcab9e54090f6128c6c2
SHA2568e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab
SHA5120fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc
-
Filesize
753B
MD53866fb14e65b22344d5f669487b38094
SHA1a1ce4e474f92ae248e1f504a129b8e3020dffb0a
SHA2566fd8666e84122acf9ea95677cfdb634868f3f89c7534f6549960a621611e47d1
SHA512a87d15362667b0996008f25a42be3e8174e3972940b016179838b23b5a2d9e8db8ff699d4865a076c640521d3eed30ea2f9e117a3c22ec5b384a620de6aee552
-
Filesize
1.1MB
MD5ee89a2c8da0746d7f0029ad93227785a
SHA177597a684824f29f5c2bd3f0394b7a586f3a5890
SHA2565ac64960345e922a5d05b0a99c2d845000e82ad577ea412f53317b70427a4ac1
SHA512b8963aa16e55f166b703a3c452339a46961747d3d92c489c87fb08914b59a70157213e597f0b22ba52fdbe32b79c299ae886d17488aada8c67955fb44bf6f8ef