Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25/04/2024, 20:15
Behavioral task
behavioral1
Sample
247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe
Resource
win10v2004-20240412-en
General
-
Target
247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe
-
Size
5.6MB
-
MD5
258d41651f71dd9495dc17e8f2702fe7
-
SHA1
4f971fd160499ec0200f784503a12191d894b8b0
-
SHA256
247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410
-
SHA512
b8e8edce5e33bd5a59c615a9a8a8ad08a702e92e794bef9c3a80718538fd208c44a06a6981faaf3edd2f5a4e882662c4654db0929e6145386e2b729da6ffb639
-
SSDEEP
98304:ExeeHncufaoTlD8AOrXQ9UR8pzePsAOmUevOshs0EOQC5oqYITMzdhHHQ82d:ExHffaoRD8AKQSe+sGUeFnEOQEofz/QD
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe -
Loads dropped DLL 2 IoCs
pid Process 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe -
resource yara_rule behavioral1/memory/2188-2-0x0000000000400000-0x0000000000E2A000-memory.dmp vmprotect behavioral1/memory/2188-4-0x0000000000400000-0x0000000000E2A000-memory.dmp vmprotect behavioral1/files/0x000d00000001224d-49.dat vmprotect behavioral1/memory/2188-56-0x0000000000400000-0x0000000000E2A000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 2188 wrote to memory of 2440 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 28 PID 2188 wrote to memory of 2440 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 28 PID 2188 wrote to memory of 2440 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 28 PID 2188 wrote to memory of 2440 2188 247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe"C:\Users\Admin\AppData\Local\Temp\247a70e7ec7ae4c8c03ee166bdcd319deb3a191400e05e5c56f0a2ee36aec410.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2188 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2440
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD5b93e4dff6366cad398fa944fe30bdc48
SHA1156056d76954122703fd8bef8624c4513afc0a56
SHA25626d2948e0475bbfeb8fd453cd5c009401a79580f07f04e0b268a867f790672ee
SHA5122bdfe257925bd5f56b8e60d971424fc50f38ab90f2adecf16bc58790765c9997b3c9e8e7224fe0ef056095e721bcd5c62e1c2d7aa1c4ed537ae63acee1c4e174
-
Filesize
753B
MD5318f74dafcc38e50d03eb0d4766dc65b
SHA1d04b95993123d3f8f7e0d95efec90d36f3783630
SHA25682b6f39c9eb11af65d67943aea9ad85bf402bf21f9a6a238806d9934a9301581
SHA512556be7f449ae988f637199e5c53c60b773ad69eeecc0d75786dc1252de6ca87dff5eeda95318057eff39991e11cc6ecc5ebb39d71e3c5f1f476e1a9e41c5926b
-
Filesize
5.6MB
MD51501971858855227cc62a2a82b859eb6
SHA11f66eecaba8cd396a3832af97a2cbd0c76d01643
SHA256966ba06da5516970aa90e1f38ceab31f910a8345a7c8be737c09e7b0042b37f3
SHA5122b08c8c2bc376736a4c954dc29247323ee5773d4f2f38023dd967ae089717f823f8565c41105f24b15d10ddffbf59ad4c6d4a64a62a7bb5637a76fd03f88a703