Resubmissions
18-04-2024 11:20
240418-nfk6macg3w 1018-04-2024 11:20
240418-nfh19scg3t 1018-04-2024 11:20
240418-nfheqsbd89 1018-04-2024 11:20
240418-nfghfacg2x 1018-04-2024 11:20
240418-nffwxacg2w 1018-04-2024 09:59
240418-l1f2asba9x 10Analysis
-
max time kernel
1809s -
max time network
1820s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
18-04-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win7-20240221-en
Behavioral task
behavioral3
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win10-20240404-en
Behavioral task
behavioral4
Sample
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
Resource
win10v2004-20240412-en
General
-
Target
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe
-
Size
350KB
-
MD5
0dc61438b79668900bd081bac6109760
-
SHA1
2ee66fd972c2d28ad30775971ba95056951910f0
-
SHA256
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd
-
SHA512
467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7
-
SSDEEP
6144:RoX0oZ+rm/OV6ZH7XYuB4xpuMadbr2X3f+gOkXdhFr:Ry0xrm/h7XYuWCMaV2XWgO8hFr
Malware Config
Extracted
systembc
knock0909.monster:4035
knock0909.xyz:4035
Signatures
-
Contacts a large (740) amount of remote hosts 1 TTPs
This may indicate a network scan to discover remotely running services.
-
Executes dropped EXE 32 IoCs
Processes:
snhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exepid process 2660 snhrm.exe 2656 snhrm.exe 1668 snhrm.exe 1196 snhrm.exe 1772 snhrm.exe 1716 snhrm.exe 2624 snhrm.exe 2668 snhrm.exe 1648 snhrm.exe 2344 snhrm.exe 1900 snhrm.exe 628 snhrm.exe 1520 snhrm.exe 3032 snhrm.exe 1744 snhrm.exe 2740 snhrm.exe 1504 snhrm.exe 1168 snhrm.exe 2456 snhrm.exe 2404 snhrm.exe 1396 snhrm.exe 1080 snhrm.exe 3068 snhrm.exe 836 snhrm.exe 2200 snhrm.exe 2324 snhrm.exe 1480 snhrm.exe 2408 snhrm.exe 2136 snhrm.exe 560 snhrm.exe 2640 snhrm.exe 992 snhrm.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 87.236.195.203 -
Looks up external IP address via web service 4 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
Processes:
flow ioc 5 api.ipify.org 6 api.ipify.org 7 ip4.seeip.org 8 ip4.seeip.org -
Uses Tor communications 1 TTPs
Malware can proxy its traffic through Tor for more anonymity.
-
Suspicious use of SetThreadContext 17 IoCs
Processes:
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exedescription pid process target process PID 2488 set thread context of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2660 set thread context of 2656 2660 snhrm.exe snhrm.exe PID 1668 set thread context of 1196 1668 snhrm.exe snhrm.exe PID 1772 set thread context of 1716 1772 snhrm.exe snhrm.exe PID 2624 set thread context of 2668 2624 snhrm.exe snhrm.exe PID 1648 set thread context of 2344 1648 snhrm.exe snhrm.exe PID 1900 set thread context of 628 1900 snhrm.exe snhrm.exe PID 1520 set thread context of 3032 1520 snhrm.exe snhrm.exe PID 1744 set thread context of 2740 1744 snhrm.exe snhrm.exe PID 1504 set thread context of 1168 1504 snhrm.exe snhrm.exe PID 2456 set thread context of 2404 2456 snhrm.exe snhrm.exe PID 1396 set thread context of 1080 1396 snhrm.exe snhrm.exe PID 3068 set thread context of 836 3068 snhrm.exe snhrm.exe PID 2200 set thread context of 2324 2200 snhrm.exe snhrm.exe PID 1480 set thread context of 2408 1480 snhrm.exe snhrm.exe PID 2136 set thread context of 560 2136 snhrm.exe snhrm.exe PID 2640 set thread context of 992 2640 snhrm.exe snhrm.exe -
Drops file in Windows directory 2 IoCs
Processes:
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exedescription ioc process File opened for modification C:\Windows\Tasks\snhrm.job 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe File created C:\Windows\Tasks\snhrm.job 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exepid process 2596 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exetaskeng.exesnhrm.exesnhrm.exesnhrm.exesnhrm.exedescription pid process target process PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2488 wrote to memory of 2596 2488 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe 318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe PID 2612 wrote to memory of 2660 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 2660 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 2660 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 2660 2612 taskeng.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2660 wrote to memory of 2656 2660 snhrm.exe snhrm.exe PID 2612 wrote to memory of 1668 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 1668 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 1668 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 1668 2612 taskeng.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 1668 wrote to memory of 1196 1668 snhrm.exe snhrm.exe PID 2612 wrote to memory of 1772 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 1772 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 1772 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 1772 2612 taskeng.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 1772 wrote to memory of 1716 1772 snhrm.exe snhrm.exe PID 2612 wrote to memory of 2624 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 2624 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 2624 2612 taskeng.exe snhrm.exe PID 2612 wrote to memory of 2624 2612 taskeng.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe PID 2624 wrote to memory of 2668 2624 snhrm.exe snhrm.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"C:\Users\Admin\AppData\Local\Temp\318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd.exe"2⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
PID:2596
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0039B306-5DC3-43BF-8EBF-C53227C6F71D} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2656
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:1196
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1772 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:1716
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2668
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1648 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2344
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1900 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:628
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1520 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:3032
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1744 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2740
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1504 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:1168
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2456 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2404
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1396 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:1080
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:3068 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:836
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2200 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2324
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:1480 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:2408
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2136 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:560
-
-
-
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
PID:2640 -
C:\ProgramData\mhgnve\snhrm.exeC:\ProgramData\mhgnve\snhrm.exe start3⤵
- Executes dropped EXE
PID:992
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
350KB
MD50dc61438b79668900bd081bac6109760
SHA12ee66fd972c2d28ad30775971ba95056951910f0
SHA256318e0bd67ccbf40f50b848831fb2885b161e68acdfaaa0c619c79b3912af2ecd
SHA512467b352ce6188e6126050c229cd47b526e83ef3535449c3f02b70491e159523d7cc8ebb28caab4e8d98627a22a0af1faf13b134072309dfe56ad175d18177ca7