Analysis
-
max time kernel
117s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
07-03-2024 19:56
Static task
static1
Behavioral task
behavioral1
Sample
b9854b708882ef37ef1e27f65b174060.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
b9854b708882ef37ef1e27f65b174060.exe
Resource
win10v2004-20240226-en
General
-
Target
b9854b708882ef37ef1e27f65b174060.exe
-
Size
34KB
-
MD5
b9854b708882ef37ef1e27f65b174060
-
SHA1
fd6774ed0e671cbe765619fe041ab93294746d07
-
SHA256
85cb91f66f432c42a71c741f807288ab2888f5601b7311b5c48bf473461a0f2a
-
SHA512
a9da65545770336a89dbb8d76c6e63abe27b71cb94eb380a8c79b541468fbe590597686d8244e52e549ac8f214370aa55214bb3a17a63a19a3edd90b728e7074
-
SSDEEP
768:MyFm2Gn9m9VTXiqzvb7QfNbPtmil8IeZhsjr8E2la2ZjH78K6:My82WmrTXNb4dFm08IeZhsP2TBH7/6
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Userinit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\system32\\sichost.exe" b9854b708882ef37ef1e27f65b174060.exe -
Deletes itself 1 IoCs
pid Process 2464 sychost.exe -
Executes dropped EXE 3 IoCs
pid Process 2984 sovlost.exe 2464 sychost.exe 2468 sichost.exe -
Loads dropped DLL 11 IoCs
pid Process 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2464 sychost.exe 2464 sychost.exe 2464 sychost.exe 2464 sychost.exe 2464 sychost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe -
Drops file in System32 directory 8 IoCs
description ioc Process File created C:\Windows\SysWOW64\ssdtti.sys b9854b708882ef37ef1e27f65b174060.exe File created C:\Windows\SysWOW64\sychost.exe b9854b708882ef37ef1e27f65b174060.exe File created C:\Windows\SysWOW64\sichost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\sichost.exe sychost.exe File opened for modification C:\Windows\SysWOW64\discard.ini sychost.exe File created C:\Windows\SysWOW64\sovlost.exe b9854b708882ef37ef1e27f65b174060.exe File opened for modification C:\Windows\SysWOW64\discard.ini b9854b708882ef37ef1e27f65b174060.exe File created C:\Windows\SysWOW64\Nessery.sys b9854b708882ef37ef1e27f65b174060.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe 2468 sichost.exe -
Suspicious behavior: LoadsDriver 1 IoCs
pid Process 464 Process not Found -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeSystemtimePrivilege 2748 b9854b708882ef37ef1e27f65b174060.exe Token: SeSystemtimePrivilege 2468 sichost.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2748 b9854b708882ef37ef1e27f65b174060.exe 2748 b9854b708882ef37ef1e27f65b174060.exe 2984 sovlost.exe 2984 sovlost.exe 2464 sychost.exe 2468 sichost.exe 2468 sichost.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 2748 wrote to memory of 2984 2748 b9854b708882ef37ef1e27f65b174060.exe 28 PID 2748 wrote to memory of 2984 2748 b9854b708882ef37ef1e27f65b174060.exe 28 PID 2748 wrote to memory of 2984 2748 b9854b708882ef37ef1e27f65b174060.exe 28 PID 2748 wrote to memory of 2984 2748 b9854b708882ef37ef1e27f65b174060.exe 28 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2748 wrote to memory of 2464 2748 b9854b708882ef37ef1e27f65b174060.exe 29 PID 2464 wrote to memory of 2468 2464 sychost.exe 30 PID 2464 wrote to memory of 2468 2464 sychost.exe 30 PID 2464 wrote to memory of 2468 2464 sychost.exe 30 PID 2464 wrote to memory of 2468 2464 sychost.exe 30 PID 2464 wrote to memory of 2468 2464 sychost.exe 30 PID 2464 wrote to memory of 2468 2464 sychost.exe 30 PID 2464 wrote to memory of 2468 2464 sychost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\b9854b708882ef37ef1e27f65b174060.exe"C:\Users\Admin\AppData\Local\Temp\b9854b708882ef37ef1e27f65b174060.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Windows\SysWOW64\sovlost.exe"C:\Windows\system32\sovlost.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2984
-
-
C:\Windows\SysWOW64\sychost.exe"C:\Windows\system32\sychost.exe"2⤵
- Deletes itself
- Executes dropped EXE
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2464 -
C:\Windows\SysWOW64\sichost.exe"C:\Windows\system32\sichost.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
91B
MD5623f3a38f819d0193b45770b724a297c
SHA1e236d5b6ef0cd3b8e0c56a57f8c7b343244d46f6
SHA256f825edad2680131917de7d0d14094b79e9a7d2a51e6940ae15b14cb88ef7dfd3
SHA51291cb253f4f942974ba5a3750fb113da5f747573817ac4d84416738c79d63f4b9bc102e8fa9e1274e77a38546265bb8b0b4f81e60a66a742dd876245780961a7a
-
Filesize
26B
MD5d8ab3ea023fda33b8017ccc4748534f8
SHA1e5c8b0f40ed03ad98f0d207ee073af2ee925db78
SHA25614776c2d9c1446833752ec1c0686cc74bee4c3bd3036b3ad7cf51249ebe381ab
SHA5120a6ab8641e77dcdc9b33e49462404aaf43ca549122d6fd5afc72448b5f50558859657d64d66d38415e752c05abaa225e545310986516eb1af0f691ff690ec5e0
-
Filesize
34KB
MD5b9854b708882ef37ef1e27f65b174060
SHA1fd6774ed0e671cbe765619fe041ab93294746d07
SHA25685cb91f66f432c42a71c741f807288ab2888f5601b7311b5c48bf473461a0f2a
SHA512a9da65545770336a89dbb8d76c6e63abe27b71cb94eb380a8c79b541468fbe590597686d8244e52e549ac8f214370aa55214bb3a17a63a19a3edd90b728e7074
-
Filesize
2KB
MD5d8771067a0815b3e741ce7414a879ba3
SHA1f21a8f45b64d256a79c58626b6a78dfda6902d5c
SHA256f763fe7f95fb3d3d9a7928c320309b32858d7843d40a9480b612d490c1c8278d
SHA51265c6d2a77110334b0acc2c63cf5a551a0a52d231ab52bebd666ecfb90d3a3016adf7cea28ac7e5ba10ebeba68c8fb311c92f0c6b2e70dbac61946abbf5079b54
-
Filesize
20KB
MD506922f78c398d807dc0bbc9fbd056393
SHA1392c01659bae0c50659b36d0d844add3935b8345
SHA2566e615d23f382153740d7aa8386a1a6d892526e4494ac5608d23a21d611cb7dab
SHA512d246abfe486fa83f51800a37e0ee690c0e027863a9e36db9a8e9a30e82c7daf857422d8496973f4abf2cd69cc52e4d63c05a55ed56874ff5e8e213f57e1bd43e
-
Filesize
20KB
MD5abdb1a784dcaefcbfb8af28599293f4f
SHA1f1601133a072db15d5941628549544771a9a264c
SHA256e7fa8bd434c1ca284b24e16b49ce888523af62dbdffc51325e467807796d12b1
SHA5128880edc42b33d750c731fdb94382edb608df31338bb882179c45b4b6873c168f12ae4854d1b01e2c58f9b56d4003adad6a18f8e5b3312e25a5b6cf7423d709c3