Analysis
-
max time kernel
149s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 18:55
Behavioral task
behavioral1
Sample
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe
Resource
win7-20240508-en
Behavioral task
behavioral2
Sample
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe
Resource
win10v2004-20240508-en
General
-
Target
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe
-
Size
558KB
-
MD5
652d1c6b3324a9f38301e4dc47d4189e
-
SHA1
09e4b19b5fa435005d1fc34247902e9ab1f35bff
-
SHA256
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f
-
SHA512
28ab9fcaac62a57cd8e4a06e305a980fb19e9969549720e7b7607800abd25f3cb41bc25cb880464d213159ce36718779127c6d9a49de61fe22cb5102bf765bcd
-
SSDEEP
12288:21+vKnoA0cdoIl9jmDBJ4Uh2DEq/51r575O65n9VG:e+vg0HU9EP4UheEq/B79u
Malware Config
Signatures
-
UPX dump on OEP (original entry point) 9 IoCs
Processes:
resource yara_rule behavioral1/memory/1724-0-0x0000000000400000-0x0000000000551000-memory.dmp UPX \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe UPX behavioral1/memory/1724-18-0x0000000000400000-0x0000000000551000-memory.dmp UPX behavioral1/memory/1724-22-0x0000000000400000-0x0000000000551000-memory.dmp UPX behavioral1/memory/1724-25-0x0000000000400000-0x0000000000551000-memory.dmp UPX behavioral1/memory/1724-29-0x0000000000400000-0x0000000000551000-memory.dmp UPX behavioral1/memory/1724-32-0x0000000000400000-0x0000000000551000-memory.dmp UPX behavioral1/memory/1724-35-0x0000000000400000-0x0000000000551000-memory.dmp UPX behavioral1/memory/1724-38-0x0000000000400000-0x0000000000551000-memory.dmp UPX -
Drops startup file 1 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\win.lnk 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe -
Loads dropped DLL 2 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exepid process 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe -
Processes:
resource yara_rule behavioral1/memory/1724-0-0x0000000000400000-0x0000000000551000-memory.dmp upx \Users\Admin\AppData\Roaming\Microsoft\svchcst.exe upx behavioral1/memory/1724-18-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/1724-22-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/1724-25-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/1724-29-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/1724-32-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/1724-35-0x0000000000400000-0x0000000000551000-memory.dmp upx behavioral1/memory/1724-38-0x0000000000400000-0x0000000000551000-memory.dmp upx -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\360safo = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\svchcst.exe" 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 8 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exepid process 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exepid process 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exepid process 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe -
Suspicious use of WriteProcessMemory 4 IoCs
Processes:
13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exedescription pid process target process PID 1724 wrote to memory of 2136 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe WScript.exe PID 1724 wrote to memory of 2136 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe WScript.exe PID 1724 wrote to memory of 2136 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe WScript.exe PID 1724 wrote to memory of 2136 1724 13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe WScript.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe"C:\Users\Admin\AppData\Local\Temp\13e1c75290ab79cd8545ec0708e3dc20eb19237f2784af99de2af0f4b83bf59f.exe"1⤵
- Drops startup file
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\Microsoft\VBS3.vbs"2⤵PID:2136
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92B
MD52004bcee923b0e0222f4cab87c2c2a3d
SHA10a3c122b7cfe403403d913ecc1b328480b1bfc2a
SHA256f92f08df2b65e2f5b5db141c99b098c8b077c0c853a1fd51bfcc6d40dc68ad77
SHA512cae47a4dfdb942622ebca65d57e9d80c29cb299aa8c217983e34a51655c2e96ed26c7fa2fad978b6279ed4d3c8c0571e417c60152bf66a116f67d0fe38d6a445
-
Filesize
753B
MD554b9da8596e5d0082d20734362a964be
SHA1fd26162c9cd70d73e332d9d7c88e438cf3e369ff
SHA256ef071d3f4a93c91349c499b35234668dac5ff9b121f2c14f0a1b939c74afeaa5
SHA512c527e8a3cb14ad17581f3590c4b9dfe7f780245ea22b099202ee8225bf275f4fca13fe41c8765c57cada1a4fc34403b4a272e9a3e6b68aee4b69f56a3e70436f
-
Filesize
558KB
MD5a00da5a818adcd1ce96a0f3f88ff2589
SHA12bb40a7192dae0f6d40f2bc4924870956db5c24b
SHA25616e60e37f9bd8276ebcef7122de8af8b801cc39db6b7d41078eac1c237a179a7
SHA512bef75b4dfb05cf5196340d9ddc966ee9ae705fc63fecab0646277bc3efb7f94d4cb85edb553da3c26921e7494d88378a2e0f40ba2420812f534700ea70b982b4