Resubmissions
17/04/2024, 09:10
240417-k5ehlaaf46 1017/04/2024, 09:10
240417-k5dw3acb9s 1017/04/2024, 09:10
240417-k5dlasaf45 1017/04/2024, 09:10
240417-k5czrsaf44 1017/04/2024, 09:10
240417-k5cc8scb8z 1016/04/2024, 14:05
240416-rebgksde3x 10Analysis
-
max time kernel
192s -
max time network
600s -
platform
windows11-21h2_x64 -
resource
win11-20240412-en -
resource tags
arch:x64arch:x86image:win11-20240412-enlocale:en-usos:windows11-21h2-x64system -
submitted
17/04/2024, 09:10
Static task
static1
Behavioral task
behavioral1
Sample
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral5
Sample
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
Resource
win11-20240412-en
General
-
Target
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
-
Size
1.9MB
-
MD5
7fd0e978ae68613a96a07194d82ff058
-
SHA1
25347be4f94a784cb261229109261aba61853308
-
SHA256
e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba
-
SHA512
d8e17eb7737eb4469e19442769c74a4f25d44c75e53c1ff9483b3e76cd93ebb0dc530b3c6e6eed6753186bdff2c1c7af3d170ac69d1a8ca21f949fcdda7daa5e
-
SSDEEP
24576:8aptmBr8CsPIejX7NsxexfMOSUH2XydxRY18S55ysdCG7QQdhph8BwvyM86:JmBr8JPxDH2XydxRY/5bdN7QQ8BWyX6
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 5012 svchost.exe 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 4408 svchost.exe 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe -
resource yara_rule behavioral5/memory/2380-19-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-20-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-16-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-21-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-22-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-23-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-38-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-56-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-57-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-59-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-64-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-66-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-67-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-68-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-69-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-73-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-74-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-77-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-81-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-84-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-76-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-85-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-90-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-87-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-82-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-79-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-71-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-92-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-100-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-112-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-114-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-99-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-107-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-106-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-110-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-98-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-108-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-104-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-102-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-91-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-97-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-95-0x0000000000400000-0x0000000000848000-memory.dmp upx behavioral5/memory/2380-88-0x0000000000400000-0x0000000000848000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\CSRSS = "\"C:\\ProgramData\\Drivers\\csrss.exe\"" e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe -
Creates a large amount of network flows 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs 3 IoCs
flow ioc 4223 sites.google.com 3149 sites.google.com 3314 sites.google.com -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2720 set thread context of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 -
Drops file in Program Files directory 39 IoCs
description ioc Process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javapackager.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\6.0.27\createdump.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\7.0.16\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javah.exe svchost.exe File opened for modification C:\Program Files\dotnet\dotnet.exe svchost.exe File opened for modification C:\Program Files\dotnet\shared\Microsoft.NETCore.App\8.0.2\createdump.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\110.0.5481.104\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk-1.8\bin\idlj.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 2380 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe -
Suspicious use of WriteProcessMemory 14 IoCs
description pid Process procid_target PID 1408 wrote to memory of 5012 1408 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 78 PID 1408 wrote to memory of 5012 1408 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 78 PID 1408 wrote to memory of 5012 1408 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 78 PID 5012 wrote to memory of 2720 5012 svchost.exe 79 PID 5012 wrote to memory of 2720 5012 svchost.exe 79 PID 5012 wrote to memory of 2720 5012 svchost.exe 79 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81 PID 2720 wrote to memory of 2380 2720 e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe 81
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:5012 -
C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
PID:2380
-
-
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4408
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.6MB
MD5436dd6d783d1a7df93340f95d7c87477
SHA1a525248aca4453f479b86efe8baa4abbb932f7ee
SHA2565704c943f7962001efb2a33a8b3e2f2413fd61589f2b628eaeb45a84e85fb702
SHA5122fd4bd221e6c518b8eae2d00484bd6dee391d99e5acc9079247139493d08ebe6b01c07271cf223b4a78f7af1f42587dce78f08ce8d54515ffa2b8c709bc96658
-
Filesize
8.2MB
MD50cfe16e0e2670be663b235c7a2f7c9a9
SHA1c900a772880ba2497b0a7ac3912836841449f8bf
SHA25689f6d09e890d74c8ba1cf5b95016e117f95fc6a57eb1ee3b0f580e3a3a23d3ae
SHA512924ab12cfc39dd9f8d1ffab2f8cdbc536a7d3178086133868f124aa4509a8c895271d1caae4b82346dfef60a22a355b1359d9b59953c8715e38d354643d8328f
-
C:\Users\Admin\AppData\Local\Temp\e6df60c235ce89a2d376b3708f8565e0c045020d08e0883ab726bebcd09086ba.exe
Filesize1.9MB
MD53b1eaf69697336c389c2f4b91c7782f4
SHA1c7649995e194921ed2ba31e27afbbbeec7fe3fe0
SHA2560899f861216a0a19c1d76624980ce1b1053b1ad3984b1a4d6e7eb0e95ace3c37
SHA512a29a22bbb837e4ec24123b58efac03da7cfac7cd106d53c8a729fff8630149ae83f05dc961d864d850cc0dd4bf66a26155d904fd1f3858401d3134f130f1393e
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b