Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10/04/2024, 10:11
Static task
static1
Behavioral task
behavioral1
Sample
30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe
Resource
win10v2004-20231215-en
General
-
Target
30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe
-
Size
1.2MB
-
MD5
d640767781188fa608b5fec293c2bc5b
-
SHA1
ce201e552998f24730bd105ddbebd41efcb3d08e
-
SHA256
30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd
-
SHA512
e42ee5d294d3f26250266dea009559b0e81575a4f96b07a7407e01837078fa2ff28b9ada5cec40eba9cf302f17ea616f2ef7c5f6239264e912e20b54e388e8bc
-
SSDEEP
24576:hb3frTqaFfUodpJ416PRntaprEyblePXTLfTCwCuV9Z:hrTNUUJ4oP/AV4PDLfTXV9Z
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 1 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" dlshsvc.exe -
Executes dropped EXE 1 IoCs
pid Process 1404 dlshsvc.exe -
Loads dropped DLL 2 IoCs
pid Process 2024 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe 2024 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ocxsvc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lib\\dlshsvc.exe" 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe Set value (str) \REGISTRY\USER\S-1-5-21-3452737119-3959686427-228443150-1000\Software\Microsoft\Windows\CurrentVersion\Run\ocxsvc = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\lib\\dlshsvc.exe" dlshsvc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe 1404 dlshsvc.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 1404 dlshsvc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2024 wrote to memory of 1404 2024 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe 28 PID 2024 wrote to memory of 1404 2024 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe 28 PID 2024 wrote to memory of 1404 2024 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe 28 PID 2024 wrote to memory of 1404 2024 30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe"C:\Users\Admin\AppData\Local\Temp\30761d0a9b08c69cfdd135c69a537aef0df516b097cd9d6a0d9528bc907f4ddd.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:2024 -
C:\Users\Admin\AppData\Roaming\Microsoft\lib\dlshsvc.exe"C:\Users\Admin\AppData\Roaming\Microsoft\lib\dlshsvc.exe"2⤵
- Modifies visibility of file extensions in Explorer
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1404
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.2MB
MD559c350390b13ffbca699ffe321fabbaa
SHA151de401ead98d3d03ed34555bb7f2bc4999e038e
SHA256a3af853a73bd074542425deea7ae092ed8588cd446679bbd04f013b986ec540f
SHA512cdf91c1d8dd84df22d7b362a084922c7c5f11457bb3ad8dd39f0d8873bf48d7de764da7e57daf29447bbf7a97d792bb99690540b09d196044862ecb5f0aadf7a