Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 02:58
Behavioral task
behavioral1
Sample
9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe
Resource
win10v2004-20240226-en
General
-
Target
9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe
-
Size
430KB
-
MD5
e669f68966c75452231ac9ddc5561ded
-
SHA1
605da3577624fb8aa6dfdc042543c737a7cfa8b9
-
SHA256
9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7
-
SHA512
b63cded4668fbab34e173711b75e2a124f9d79d67f11556b192e40d3047f18ec193941032c57f1ed10ef2f7b7d3c834b8a938bd9347446d048d6c354e65c079b
-
SSDEEP
12288:CzCr6D+2OkeG9F1xk1kwZRo5FbDFBQX6f6AkdIAELARixZFDuh:Cza2OkeG9jxyTo5Fbz/zkOLLARixXDuh
Malware Config
Signatures
-
resource yara_rule behavioral1/files/0x000b00000001224f-13.dat aspack_v212_v242 -
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe -
Loads dropped DLL 2 IoCs
pid Process 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 9 IoCs
pid Process 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2192 wrote to memory of 2652 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 28 PID 2192 wrote to memory of 2652 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 28 PID 2192 wrote to memory of 2652 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 28 PID 2192 wrote to memory of 2652 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 28 PID 2192 wrote to memory of 2668 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 29 PID 2192 wrote to memory of 2668 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 29 PID 2192 wrote to memory of 2668 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 29 PID 2192 wrote to memory of 2668 2192 9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe"C:\Users\Admin\AppData\Local\Temp\9c2b29e00b1b3075fc5488265c58413da15d345f8f4fbfd0d3e093ecf7537de7.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2652
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2668
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD55611518085f0e601b7af262b73ca1e21
SHA1679e284b4e15030b11e9fcab9e54090f6128c6c2
SHA2568e59e3dc5427519534af0cfb2713d94388d03240f4f6d2c9ec6a13db1d9812ab
SHA5120fc4c396d00386c7942366bab8bf30b59723f4a8b0d5bfe00dbc4a74df13acb68cd6616694a81de199bcd2409ff41b6dcaca931614165deefadd728350c52bcc
-
Filesize
753B
MD5f2cc75f7b733d78c895cd694c43001fd
SHA160d407ce6e06da6b3002ddc25b48aba75f021980
SHA256a3111a977b9863c02699408ce5fb0797c43da0a4dbdfb9cfc0db02df4e4c2474
SHA51272cfd2d67ea043353b4d458d7c2c09d3e9ce4ba62846c8a4aa237a94b3fe015c6108791c8e0fcc9d7a8b9a000af28d804d83b96fc90a88be66c3460a1083cff8
-
Filesize
430KB
MD50f299205bc9451ed021f9b58a72e070e
SHA1da145d7b42675c42a2ca8ea1a8c82bafcc24ba14
SHA256d188f12e08d54b26b5ef4796e1bb1d8db15c2e9555fc658da7c4a31653f787b9
SHA5128fb107c1dce89dc413e4dd2e2331afc9612cd72b828ab253e71bc391f8eba95f708a8ed9f0f53017bab44183f3524d8659d5596d5ca147f95deacf4420c7bed3