Analysis
-
max time kernel
257s -
max time network
288s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
16-05-2024 22:53
Static task
static1
Behavioral task
behavioral1
Sample
306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe
Resource
win10-20240404-en
General
-
Target
306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe
-
Size
667KB
-
MD5
e953d58e12762f7283bf62ad9f214dbb
-
SHA1
e2915c5f414312a3fdc7e5f353de3d3d15cd6a22
-
SHA256
306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c
-
SHA512
993f5859da479952cb66fd2f286d3843092a1a7393a66b97ff174178d303d864ba8e10c459a2e68f8b28b0eb9f4ecefc90ac25e251febff21f033ec8aaab8004
-
SSDEEP
6144:tM0RkR33Bj+4jZr3iXlmGNa/LULvJ5+4weYmKNtgeAUBMmihN:tM0uRvVSVmGULqvJGe32/tk
Malware Config
Extracted
systembc
212.162.153.199:4382
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 32 svshost.exe.exe 3888 svshost.exe.exe 3680 svshost.exe.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-160447019-1232603106-4168707212-1000\Software\Microsoft\Windows\CurrentVersion\Run\scshost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\Windows\\Templates\\svshost.exe.exe" reg.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 32 set thread context of 3680 32 svshost.exe.exe 83 -
Runs ping.exe 1 TTPs 3 IoCs
pid Process 4148 PING.EXE 3112 PING.EXE 5068 PING.EXE -
Suspicious behavior: EnumeratesProcesses 19 IoCs
pid Process 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 32 svshost.exe.exe 32 svshost.exe.exe 32 svshost.exe.exe 32 svshost.exe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe Token: SeDebugPrivilege 32 svshost.exe.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 4440 wrote to memory of 4444 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 73 PID 4440 wrote to memory of 4444 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 73 PID 4440 wrote to memory of 4444 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 73 PID 4444 wrote to memory of 4148 4444 cmd.exe 75 PID 4444 wrote to memory of 4148 4444 cmd.exe 75 PID 4444 wrote to memory of 4148 4444 cmd.exe 75 PID 4440 wrote to memory of 4356 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 76 PID 4440 wrote to memory of 4356 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 76 PID 4440 wrote to memory of 4356 4440 306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe 76 PID 4356 wrote to memory of 3112 4356 cmd.exe 78 PID 4356 wrote to memory of 3112 4356 cmd.exe 78 PID 4356 wrote to memory of 3112 4356 cmd.exe 78 PID 4444 wrote to memory of 3084 4444 cmd.exe 79 PID 4444 wrote to memory of 3084 4444 cmd.exe 79 PID 4444 wrote to memory of 3084 4444 cmd.exe 79 PID 4356 wrote to memory of 5068 4356 cmd.exe 80 PID 4356 wrote to memory of 5068 4356 cmd.exe 80 PID 4356 wrote to memory of 5068 4356 cmd.exe 80 PID 4356 wrote to memory of 32 4356 cmd.exe 81 PID 4356 wrote to memory of 32 4356 cmd.exe 81 PID 4356 wrote to memory of 32 4356 cmd.exe 81 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3888 32 svshost.exe.exe 82 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83 PID 32 wrote to memory of 3680 32 svshost.exe.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe"C:\Users\Admin\AppData\Local\Temp\306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4440 -
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 10 > nul && REG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "scshost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4444 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 103⤵
- Runs ping.exe
PID:4148
-
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /f /v "scshost" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"3⤵
- Adds Run key to start application
PID:3084
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd" /c ping 127.0.0.1 -n 14 > nul && copy "C:\Users\Admin\AppData\Local\Temp\306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe" && ping 127.0.0.1 -n 14 > nul && "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4356 -
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 143⤵
- Runs ping.exe
PID:3112
-
-
C:\Windows\SysWOW64\PING.EXEping 127.0.0.1 -n 143⤵
- Runs ping.exe
PID:5068
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:32 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"4⤵
- Executes dropped EXE
PID:3888
-
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Templates\svshost.exe.exe"4⤵
- Executes dropped EXE
PID:3680
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
667KB
MD5e953d58e12762f7283bf62ad9f214dbb
SHA1e2915c5f414312a3fdc7e5f353de3d3d15cd6a22
SHA256306cc027d7a227d3fcf353f47eea9292c400dfae4063cfdb5b85a37c5978d79c
SHA512993f5859da479952cb66fd2f286d3843092a1a7393a66b97ff174178d303d864ba8e10c459a2e68f8b28b0eb9f4ecefc90ac25e251febff21f033ec8aaab8004