Resubmissions
11/04/2024, 07:03
240411-hvc6nsec43 811/04/2024, 06:53
240411-hnmrjahb6x 811/04/2024, 06:53
240411-hnl51ahb6w 811/04/2024, 06:53
240411-hnljgahb6t 811/04/2024, 06:52
240411-hnk8pshb6s 807/04/2024, 08:41
240407-klez1shb5t 807/04/2024, 08:40
240407-kk9s1ahe89 807/04/2024, 08:40
240407-kk3ppahe86 807/04/2024, 08:40
240407-kkxhnshe82 807/04/2024, 08:27
240407-kcrx8agh5v 8Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
07/04/2024, 08:27
Static task
static1
Behavioral task
behavioral1
Sample
5c8c4357da5f3293b60e805e947e25d2.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
5c8c4357da5f3293b60e805e947e25d2.exe
Resource
win10v2004-20240226-en
General
-
Target
5c8c4357da5f3293b60e805e947e25d2.exe
-
Size
5.3MB
-
MD5
5c8c4357da5f3293b60e805e947e25d2
-
SHA1
428892c52f224692b3203563115278e150021560
-
SHA256
0a8595501ceb2f0966de998f1c52f690dcb84c6e6737da8e2edd52ca5a246b02
-
SHA512
889c2efa0a4efc8403493c83c87fc52ac31735f84f4a50576f30b05ad12a9668bc5ed06372a8af54e794731423bd9e92a80798bccee4987921ff272612e017db
-
SSDEEP
98304:t5UNhjBIapm1m/41UX7V7pRn9FicKYVTaSVe330Gx3QtzWrTUhX/7IIYMytPvZK4:zUTjHflWISkG6d/dyJZKGqh0Ubx
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 2 IoCs
pid Process 1772 netsh.exe 3736 netsh.exe -
Checks computer location settings 2 TTPs 3 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation 5c8c4357da5f3293b60e805e947e25d2.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-566096764-1992588923-1249862864-1000\Control Panel\International\Geo\Nation ~tlECCC.tmp -
Executes dropped EXE 3 IoCs
pid Process 4372 svchost.exe 1972 ~tlECCC.tmp 4080 svchost.exe -
Drops file in Windows directory 6 IoCs
description ioc Process File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak ~tlECCC.tmp File opened for modification C:\Windows\System\svchost.exe ~tlECCC.tmp File created C:\Windows\System\xxx1.bak 5c8c4357da5f3293b60e805e947e25d2.exe File created C:\Windows\System\svchost.exe 5c8c4357da5f3293b60e805e947e25d2.exe File opened for modification C:\Windows\System\svchost.exe 5c8c4357da5f3293b60e805e947e25d2.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4908 schtasks.exe 4364 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 2740 powershell.exe 2892 powershell.exe 2740 powershell.exe 2892 powershell.exe 2916 5c8c4357da5f3293b60e805e947e25d2.exe 2916 5c8c4357da5f3293b60e805e947e25d2.exe 4416 powershell.exe 1128 powershell.exe 4416 powershell.exe 1128 powershell.exe 1972 ~tlECCC.tmp 1972 ~tlECCC.tmp 2384 powershell.exe 2384 powershell.exe 2520 powershell.exe 2520 powershell.exe 1972 ~tlECCC.tmp 1972 ~tlECCC.tmp -
Suspicious use of AdjustPrivilegeToken 6 IoCs
description pid Process Token: SeDebugPrivilege 2740 powershell.exe Token: SeDebugPrivilege 2892 powershell.exe Token: SeDebugPrivilege 4416 powershell.exe Token: SeDebugPrivilege 1128 powershell.exe Token: SeDebugPrivilege 2384 powershell.exe Token: SeDebugPrivilege 2520 powershell.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 2916 wrote to memory of 2892 2916 5c8c4357da5f3293b60e805e947e25d2.exe 98 PID 2916 wrote to memory of 2892 2916 5c8c4357da5f3293b60e805e947e25d2.exe 98 PID 2916 wrote to memory of 2740 2916 5c8c4357da5f3293b60e805e947e25d2.exe 99 PID 2916 wrote to memory of 2740 2916 5c8c4357da5f3293b60e805e947e25d2.exe 99 PID 2916 wrote to memory of 4364 2916 5c8c4357da5f3293b60e805e947e25d2.exe 102 PID 2916 wrote to memory of 4364 2916 5c8c4357da5f3293b60e805e947e25d2.exe 102 PID 2916 wrote to memory of 4372 2916 5c8c4357da5f3293b60e805e947e25d2.exe 104 PID 2916 wrote to memory of 4372 2916 5c8c4357da5f3293b60e805e947e25d2.exe 104 PID 4372 wrote to memory of 4416 4372 svchost.exe 106 PID 4372 wrote to memory of 4416 4372 svchost.exe 106 PID 4372 wrote to memory of 1128 4372 svchost.exe 108 PID 4372 wrote to memory of 1128 4372 svchost.exe 108 PID 4372 wrote to memory of 1972 4372 svchost.exe 110 PID 4372 wrote to memory of 1972 4372 svchost.exe 110 PID 1972 wrote to memory of 4572 1972 ~tlECCC.tmp 111 PID 1972 wrote to memory of 4572 1972 ~tlECCC.tmp 111 PID 1972 wrote to memory of 1772 1972 ~tlECCC.tmp 113 PID 1972 wrote to memory of 1772 1972 ~tlECCC.tmp 113 PID 1972 wrote to memory of 3736 1972 ~tlECCC.tmp 115 PID 1972 wrote to memory of 3736 1972 ~tlECCC.tmp 115 PID 1972 wrote to memory of 2384 1972 ~tlECCC.tmp 117 PID 1972 wrote to memory of 2384 1972 ~tlECCC.tmp 117 PID 1972 wrote to memory of 2520 1972 ~tlECCC.tmp 119 PID 1972 wrote to memory of 2520 1972 ~tlECCC.tmp 119 PID 1972 wrote to memory of 1460 1972 ~tlECCC.tmp 121 PID 1972 wrote to memory of 1460 1972 ~tlECCC.tmp 121 PID 1972 wrote to memory of 4908 1972 ~tlECCC.tmp 123 PID 1972 wrote to memory of 4908 1972 ~tlECCC.tmp 123 PID 1972 wrote to memory of 4080 1972 ~tlECCC.tmp 125 PID 1972 wrote to memory of 4080 1972 ~tlECCC.tmp 125 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\5c8c4357da5f3293b60e805e947e25d2.exe"C:\Users\Admin\AppData\Local\Temp\5c8c4357da5f3293b60e805e947e25d2.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2892
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2740
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:4364
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4372 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4416
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1128
-
-
C:\Users\Admin\AppData\Local\Temp\~tlECCC.tmpC:\Users\Admin\AppData\Local\Temp\~tlECCC.tmp3⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SYSTEM32\netsh.exenetsh int ipv4 set dynamicport tcp start=1025 num=645114⤵PID:4572
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:1772
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes4⤵
- Modifies Windows Firewall
PID:3736
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2384
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"4⤵PID:1460
-
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM4⤵
- Creates scheduled task(s)
PID:4908
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal4⤵
- Executes dropped EXE
PID:4080
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD5d65ebc84c6b0b52901fb46f5e2b83ab5
SHA1d036a0c3eb9e1616d0f7f5ca41171060c13a3095
SHA256d45581b0807a0d04a70ec75e3e4575e73f148e5b4e0d3d325dfbd6400a4bfbd1
SHA51288ac232e7702ebd53788cf8429d266ae367111bfccf4bc9d40ead25b552347521458ca60d320e2775b5d2edcaf8501251cb2db68b38dc000ac50463fb80865be
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD5be5e63276ed49ce1e4d8e6f8c722cf8e
SHA1373143c33712bd6133ea7685124fa137c6b28baa
SHA25639d1c27849a93fe087564c8cecd773ffc6a9b965c554094f3b99ce7f54afb1c1
SHA512825d8d09b455752f9e850495e58d6dc5a7d1ebfd6c02796f452b92c77f67d65c87567d9be1e955e91d6432b95cfd4e6193223a6930453ae2f93c12cae86886f6
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
385KB
MD5e802c96760e48c5139995ffb2d891f90
SHA1bba3d278c0eb1094a26e5d2f4c099ad685371578
SHA256cb82ea45a37f8f79d10726a7c165aa5b392b68d5ac954141129c1762a539722c
SHA51297300ac501be6b6ea3ac1915361dd472824fe612801cab8561a02c7df071b1534190d2d5ef872d89d24c8c915b88101e7315f948f53215c2538d661181e3a5f0
-
Filesize
2.6MB
MD5dfa55fd7926aaa64e863aef6e728410e
SHA1b74f5e363e6aa070d85ef986d9905f1f5435f200
SHA25604415cf26f3bdcc2c7aede2881ec215acae7696e001b19b18c8f0afd9800bcab
SHA512abbf86bcc8eb0c169c2e278bc6f694ac80a69b32fd99aaf1fc2a6669414694322e08a8371b1c39dd25d777535e075ad3a1aed47c9dbc3ca3e05b643153e35313
-
Filesize
18.2MB
MD5f1d296a685838ab457b9460775a97b5e
SHA160c07e8ddd37da19a148c700099fc94f2b708648
SHA2569398b48d4c2db6760de40bfa7a37190283f666676ddd1770612c74c155250d50
SHA5126c2f2f455e6423767bfd235d27177e975f335cf76d4cec1ab08ecd692adc1e1f8ffebde5fd2d101a9f9235ac5c6f33c0952e712c857caf027b32dbcb064aa184
-
Filesize
5.3MB
MD55c8c4357da5f3293b60e805e947e25d2
SHA1428892c52f224692b3203563115278e150021560
SHA2560a8595501ceb2f0966de998f1c52f690dcb84c6e6737da8e2edd52ca5a246b02
SHA512889c2efa0a4efc8403493c83c87fc52ac31735f84f4a50576f30b05ad12a9668bc5ed06372a8af54e794731423bd9e92a80798bccee4987921ff272612e017db