Analysis
-
max time kernel
117s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07/03/2024, 23:09
Static task
static1
Behavioral task
behavioral1
Sample
b9e65dcaaebcaaa7393f677997a7aa79.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9e65dcaaebcaaa7393f677997a7aa79.exe
Resource
win10v2004-20240226-en
General
-
Target
b9e65dcaaebcaaa7393f677997a7aa79.exe
-
Size
35KB
-
MD5
b9e65dcaaebcaaa7393f677997a7aa79
-
SHA1
fee140708be425e5ec3a827ee6083f1ec7072a13
-
SHA256
798f8698fc6a500b954a0bad01acc25e9120c2ab3e7c74c40e8f9ff936129b28
-
SHA512
34c4a35efef7c73b2a8198005589822d438f9674934bc0ca355bce9db02652304501abab1195d81baa53b5052be0808848bc0d701d831de7efdcb2f5002bf0ed
-
SSDEEP
768:WSFD2Dn9m9VTXiOjO4ZcXZbgFqKdbdNhe05WPCc2erQl:WSx2ZmrTXljORXFgFT5Jh5WPCcdEl
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\sichost.exe" b9e65dcaaebcaaa7393f677997a7aa79.exe -
Deletes itself 1 IoCs
pid Process 2632 sychost.exe -
Executes dropped EXE 3 IoCs
pid Process 2512 sovlost.exe 2632 sychost.exe 2580 sichost.exe -
Loads dropped DLL 11 IoCs
pid Process 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2632 sychost.exe 2632 sychost.exe 2632 sychost.exe 2632 sychost.exe 2632 sychost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\discard.ini b9e65dcaaebcaaa7393f677997a7aa79.exe File created C:\Windows\SysWOW64\Nessery.sys b9e65dcaaebcaaa7393f677997a7aa79.exe File created C:\Windows\SysWOW64\ssdtti.sys b9e65dcaaebcaaa7393f677997a7aa79.exe File created C:\Windows\SysWOW64\sychost.exe b9e65dcaaebcaaa7393f677997a7aa79.exe File created C:\Windows\SysWOW64\sichost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\sichost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\discard.ini sychost.exe File created C:\Windows\SysWOW64\sovlost.exe b9e65dcaaebcaaa7393f677997a7aa79.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe 2580 sichost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe Token: SeSystemtimePrivilege 2580 sichost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 2512 sovlost.exe 2512 sovlost.exe 2632 sychost.exe 2580 sichost.exe 2580 sichost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2232 wrote to memory of 2512 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 28 PID 2232 wrote to memory of 2512 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 28 PID 2232 wrote to memory of 2512 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 28 PID 2232 wrote to memory of 2512 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 28 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2232 wrote to memory of 2632 2232 b9e65dcaaebcaaa7393f677997a7aa79.exe 29 PID 2632 wrote to memory of 2580 2632 sychost.exe 30 PID 2632 wrote to memory of 2580 2632 sychost.exe 30 PID 2632 wrote to memory of 2580 2632 sychost.exe 30 PID 2632 wrote to memory of 2580 2632 sychost.exe 30 PID 2632 wrote to memory of 2580 2632 sychost.exe 30 PID 2632 wrote to memory of 2580 2632 sychost.exe 30 PID 2632 wrote to memory of 2580 2632 sychost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9e65dcaaebcaaa7393f677997a7aa79.exe"C:\Users\Admin\AppData\Local\Temp\b9e65dcaaebcaaa7393f677997a7aa79.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2232 -
C:\Windows\SysWOW64\sovlost.exe"C:\Windows\system32\sovlost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512
-
-
C:\Windows\SysWOW64\sychost.exe"C:\Windows\system32\sychost.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Windows\SysWOW64\sichost.exe"C:\Windows\system32\sichost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91B
MD58f05f9a770bb85e64bb0e559bd1bf908
SHA18339b5d9eb911aa2c1da49ac7a7ec06dbd237347
SHA256b5228a86abb336cc4f8fac4703f38ea5c005f245bbaf04d119a8a0c36239cfac
SHA5128f232deb20d61fa58f7d5abd93b367e15f3b9f2b0a264d5b905641231f5ffc0419a3c6903285d7e9976e5f73015a5959b8c585e7cf8cca438b12f51e5d939631
-
Filesize
26B
MD5d8ab3ea023fda33b8017ccc4748534f8
SHA1e5c8b0f40ed03ad98f0d207ee073af2ee925db78
SHA25614776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab
SHA5120a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0
-
Filesize
35KB
MD5b9e65dcaaebcaaa7393f677997a7aa79
SHA1fee140708be425e5ec3a827ee6083f1ec7072a13
SHA256798f8698fc6a500b954a0bad01acc25e9120c2ab3e7c74c40e8f9ff936129b28
SHA51234c4a35efef7c73b2a8198005589822d438f9674934bc0ca355bce9db02652304501abab1195d81baa53b5052be0808848bc0d701d831de7efdcb2f5002bf0ed
-
Filesize
2KB
MD51e14c892a6d3bd78c5508a13873b9e7b
SHA1a817f4492fd9b0013eda6cb45624af8ce4b04efa
SHA25699cc0877502487b5d58ce9921366fbd299253673c33c8b4d67fc872323dc334e
SHA51211b0393308cb5239c4f0a7c31d6fd09e03c7a623941d1c408f1ab4119ba4089382a57db7a52990009f20ec54eb71dff2aafd6c75a0c17789edabf6f85dd298e6
-
Filesize
20KB
MD533bb2a692bd2dada7d6f7a574dce9305
SHA1e18ab04b0f3d4cd7c968bd0c0b3b6d1ffd66b96b
SHA256af27d3417da82b642c67a80d6d98f815b9ebf333e8038c9f4446ae598475afb7
SHA512474a626a2d598a9be2cbba06257d5dc9115cf6b099df804a9e7860965dec03df365e4d351088ec04ac6c2d53c047db71007d01ec5e6258e67bd5f20c71195b23
-
Filesize
20KB
MD5abdb1a784dcaefcbfb8af28599293f4f
SHA1f1601133a072db15d5941628549544771a9a264c
SHA256e7fa8bd434c1ca284b24e16b49ce888523af62dbdffc51325e467807796d12b1
SHA5128880edc42b33d750c731fdb94382edb608df31338bb882179c45b4b6873c168f12ae4854d1b01e2c58f9b56d4003adad6a18f8e5b3312e25a5b6cf7423d709c3