Analysis
-
max time kernel
126s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31/05/2024, 01:32
Static task
static1
Behavioral task
behavioral1
Sample
a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe
Resource
win10v2004-20240426-en
General
-
Target
a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe
-
Size
5.7MB
-
MD5
499b681e0d100aa7f93837304ed71689
-
SHA1
c8ac53450658a271fd2e8afd93199f0d8f6b34e9
-
SHA256
a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff
-
SHA512
79f8b4e3d7a88c33daa81c1b5cebf6e9703f1723eec1b331b747d6d21633ba9dc93cd709905442ab6c479d84b1d7b838a324c474984aed147a95f41a7f64be91
-
SSDEEP
98304:g2mDMmD2mDc2mDMmD2mDe2mDMmD2mDc2mDMmD2mDe2mDMmD2mDc2mDMmD2mDp:g2mDMmD2mDc2mDMmD2mDe2mDMmD2mDc3
Malware Config
Signatures
-
Modifies visibility of file extensions in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" avscan.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\HideFileExt = "1" hosts.exe -
Modifies visiblity of hidden/system files in Explorer 2 TTPs 3 IoCs
description ioc Process Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" hosts.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe Set value (int) \REGISTRY\USER\S-1-5-21-330940541-141609230-1670313778-1000\Software\Microsoft\Windows\CurrentVersion\Explorer\Advanced\ShowSuperHidden = "0" avscan.exe -
Adds policy Run key to start application 2 TTPs 6 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KXIPPCKF = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KXIPPCKF = "W_X_C.bat" WScript.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run WScript.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\KXIPPCKF = "W_X_C.bat" WScript.exe -
Executes dropped EXE 6 IoCs
pid Process 2572 avscan.exe 2508 avscan.exe 2472 hosts.exe 2412 hosts.exe 1364 avscan.exe 2692 hosts.exe -
Loads dropped DLL 5 IoCs
pid Process 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 2572 avscan.exe 2472 hosts.exe 2472 hosts.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" avscan.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\avscan = "C:\\Users\\Admin\\AppData\\Local\\Temp\\avscan.exe" hosts.exe -
Drops file in Windows directory 5 IoCs
description ioc Process File created C:\windows\W_X_C.vbs a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe File created \??\c:\windows\W_X_C.bat a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe File opened for modification C:\Windows\hosts.exe a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe File opened for modification C:\Windows\hosts.exe avscan.exe File opened for modification C:\Windows\hosts.exe hosts.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry key 1 TTPs 9 IoCs
pid Process 2004 REG.exe 1308 REG.exe 1712 REG.exe 2236 REG.exe 268 REG.exe 1188 REG.exe 1816 REG.exe 3040 REG.exe 844 REG.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2572 avscan.exe 2472 hosts.exe -
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 2572 avscan.exe 2508 avscan.exe 2412 hosts.exe 2472 hosts.exe 1364 avscan.exe 2692 hosts.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2876 wrote to memory of 3040 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 28 PID 2876 wrote to memory of 3040 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 28 PID 2876 wrote to memory of 3040 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 28 PID 2876 wrote to memory of 3040 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 28 PID 2876 wrote to memory of 2572 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 30 PID 2876 wrote to memory of 2572 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 30 PID 2876 wrote to memory of 2572 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 30 PID 2876 wrote to memory of 2572 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 30 PID 2572 wrote to memory of 2508 2572 avscan.exe 31 PID 2572 wrote to memory of 2508 2572 avscan.exe 31 PID 2572 wrote to memory of 2508 2572 avscan.exe 31 PID 2572 wrote to memory of 2508 2572 avscan.exe 31 PID 2572 wrote to memory of 2712 2572 avscan.exe 32 PID 2572 wrote to memory of 2712 2572 avscan.exe 32 PID 2572 wrote to memory of 2712 2572 avscan.exe 32 PID 2572 wrote to memory of 2712 2572 avscan.exe 32 PID 2876 wrote to memory of 3048 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 34 PID 2876 wrote to memory of 3048 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 34 PID 2876 wrote to memory of 3048 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 34 PID 2876 wrote to memory of 3048 2876 a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe 34 PID 3048 wrote to memory of 2472 3048 cmd.exe 37 PID 3048 wrote to memory of 2472 3048 cmd.exe 37 PID 3048 wrote to memory of 2472 3048 cmd.exe 37 PID 3048 wrote to memory of 2472 3048 cmd.exe 37 PID 2712 wrote to memory of 2412 2712 cmd.exe 36 PID 2712 wrote to memory of 2412 2712 cmd.exe 36 PID 2712 wrote to memory of 2412 2712 cmd.exe 36 PID 2712 wrote to memory of 2412 2712 cmd.exe 36 PID 3048 wrote to memory of 772 3048 cmd.exe 38 PID 3048 wrote to memory of 772 3048 cmd.exe 38 PID 3048 wrote to memory of 772 3048 cmd.exe 38 PID 3048 wrote to memory of 772 3048 cmd.exe 38 PID 2712 wrote to memory of 792 2712 cmd.exe 39 PID 2712 wrote to memory of 792 2712 cmd.exe 39 PID 2712 wrote to memory of 792 2712 cmd.exe 39 PID 2712 wrote to memory of 792 2712 cmd.exe 39 PID 2472 wrote to memory of 1364 2472 hosts.exe 40 PID 2472 wrote to memory of 1364 2472 hosts.exe 40 PID 2472 wrote to memory of 1364 2472 hosts.exe 40 PID 2472 wrote to memory of 1364 2472 hosts.exe 40 PID 2472 wrote to memory of 2664 2472 hosts.exe 41 PID 2472 wrote to memory of 2664 2472 hosts.exe 41 PID 2472 wrote to memory of 2664 2472 hosts.exe 41 PID 2472 wrote to memory of 2664 2472 hosts.exe 41 PID 2664 wrote to memory of 2692 2664 cmd.exe 43 PID 2664 wrote to memory of 2692 2664 cmd.exe 43 PID 2664 wrote to memory of 2692 2664 cmd.exe 43 PID 2664 wrote to memory of 2692 2664 cmd.exe 43 PID 2664 wrote to memory of 1652 2664 cmd.exe 44 PID 2664 wrote to memory of 1652 2664 cmd.exe 44 PID 2664 wrote to memory of 1652 2664 cmd.exe 44 PID 2664 wrote to memory of 1652 2664 cmd.exe 44 PID 2572 wrote to memory of 844 2572 avscan.exe 47 PID 2572 wrote to memory of 844 2572 avscan.exe 47 PID 2572 wrote to memory of 844 2572 avscan.exe 47 PID 2572 wrote to memory of 844 2572 avscan.exe 47 PID 2472 wrote to memory of 2236 2472 hosts.exe 49 PID 2472 wrote to memory of 2236 2472 hosts.exe 49 PID 2472 wrote to memory of 2236 2472 hosts.exe 49 PID 2472 wrote to memory of 2236 2472 hosts.exe 49 PID 2572 wrote to memory of 268 2572 avscan.exe 51 PID 2572 wrote to memory of 268 2572 avscan.exe 51 PID 2572 wrote to memory of 268 2572 avscan.exe 51 PID 2572 wrote to memory of 268 2572 avscan.exe 51
Processes
-
C:\Users\Admin\AppData\Local\Temp\a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe"C:\Users\Admin\AppData\Local\Temp\a785217a9ed8b46b82f203788b9f4309cd07d4375274c7ecce4a306367f71dff.exe"1⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f2⤵
- Modifies registry key
PID:3040
-
-
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe2⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2508
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\windows\W_X_C.bat3⤵
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\windows\hosts.exeC:\windows\hosts.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"4⤵
- Adds policy Run key to start application
PID:792
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:844
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:268
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:1308
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f3⤵
- Modifies registry key
PID:2004
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\windows\W_X_C.bat2⤵
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\windows\hosts.exeC:\windows\hosts.exe3⤵
- Modifies visibility of file extensions in Explorer
- Modifies visiblity of hidden/system files in Explorer
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\avscan.exeC:\Users\Admin\AppData\Local\Temp\avscan.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1364
-
-
C:\Windows\SysWOW64\cmd.execmd /c c:\windows\W_X_C.bat4⤵
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\windows\hosts.exeC:\windows\hosts.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2692
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"5⤵
- Adds policy Run key to start application
PID:1652
-
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:2236
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:1188
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:1712
-
-
C:\Windows\SysWOW64\REG.exeREG DELETE HKLM\SYSTEM\CurrentControlSet\Control\SafeBoot /f4⤵
- Modifies registry key
PID:1816
-
-
-
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Windows\W_X_C.vbs"3⤵
- Adds policy Run key to start application
PID:772
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
11.5MB
MD58358e4f6829ce7495b5a72d92b245866
SHA1a63c1194ea3d2da7720b7e3c45f4d2de55aea645
SHA256fff4ca99fef930b26873ccd40f16090f5f0369b892aa5ef9adb0b59e2d163056
SHA512b4a8d8417e3d8c2545f03fb86129367d786860520bf9d295044cd5efd870b32f8778a632e6ace65fdf2578df02d52b4e60c56246cd3fa709d8beae2e6bd0b25f
-
Filesize
23.0MB
MD5039608e5b56fd7093dfc8a138938b014
SHA17d2fa66fcc7c3a55c885c16f11c33d7c23c00a74
SHA2561ac1266838ffea4c3e6b639eeb23016c7b91f37969431a63667552e3fcb5ffd4
SHA512001c38719e84f93721004ef842af82259355afd1c25beff0cabdf4be5475048e729af341016b2179c27b8d8bfd9b7c3e98671e9a6b3e62a2f6956cdd08730fb2
-
Filesize
23.0MB
MD5f700ca144cc049614b44c183a5199368
SHA173849681c2351950ed34a5089c5545e23b4ea416
SHA2561b2e75f32b250a6547f51491e8944105b25225d40747c9d4f13d19ea9bc182c4
SHA5128e7687b59fe20b9c7bda815516dbe69eb01ac977d0b268946b513e40f2c632dc945621e846c9ca37ec99713241296e4daa347f4d37a2bee2fcdcccab87f53b03
-
Filesize
34.5MB
MD5a3f0c8e29347dc87d5872deacbdace37
SHA18086483213ff640f2e13d138fb296742bfca7e5e
SHA256b63d6a4fce9bf0a935b42513e29ea8db986aa0fddfd22994c919ba7318f8fd4d
SHA512036d02f58c6431835c7f523ee95fdef68f5efcccbab129ceaed84d2549263b872f0c24625bc59de7dfe9d44367cfd2c7c5c671de16f445511491a26e63bc9a2e
-
Filesize
34.5MB
MD548a8bcfdd2d9c4f7ca8a1c66b75bcd8f
SHA1e42a24adb6c8ecd0af8b32fcf646daf5fe9340d1
SHA256f71a3d021812dd993ac4683f348484af69d04dd7cde8aabcebc8f1f1551f7eb6
SHA51266b725981ee30ae4857794e0149a02ecf1a3ecc4438dab3307856b899c3b47f3424e6cbe9463991e56b253b94cb4a5693caf458e24f057fdc81d2e95d0eff7bf
-
Filesize
45.9MB
MD53304c1b9fdcb86f659c51756fc5f1a9f
SHA150bee5c14393c38869bfc7d63ff22e404c5428db
SHA256416e5ff25bd95f8dd82527dc1b7540986ca8e789a6f626d00624ebc6b9d7b4f1
SHA5122d3c32d5acd0efc24465e83450f3a01c04c7c40ca9438a719e700c63c79f38f2516f853118d7e47f12c3459ada204c648fc4f47d524f21772bb252d656cdfb40
-
Filesize
45.9MB
MD5ad8052b246ab89962c13ede723db9c9d
SHA11119407fbf71705b7136f16979a132434110a3ec
SHA256d1f51ae19bdf39bd3fa9b3d162bf6cdc7b498bfc4f68dcd9e048a0a8f7ac0559
SHA51271e07e0f533fbaf15da0637b6460a39c0731a671769149f343034bc59163ed5073c157f44c254141c074f8df683277efd4b36e71b35f1f97b37c24dee7b20c92
-
Filesize
195B
MD5a849230bdadf5127f9d776ca57d9ed5b
SHA1011bc75f6eded49cabdd2ee53d7399eb897489cd
SHA2569704b32703ce155ed5057f0c08f1bb4b03b7bc61ed4c55c41d9fea09ccaa6742
SHA5127604ebf83392f4d241d730f7ced8e7ad874e5db1de639b0a18ee5c33523a645b1202fff9c78fc99d49a4a17f63686cda82884a19bec05e97769c6060da5be3ca
-
Filesize
5.7MB
MD586c1a18990e24d395d12771949c1921e
SHA18d8409d13b1e6616c21dfb4c53cd63c2ed05b55c
SHA256e4ef6c0c6d183dff750056e3974126277d503b064e28e02b67d6e75567fe779c
SHA5124b7067d2e48a3bae5f7eb1982467efdafe086b9d378476e092c2d2cbda624b35a1c568e4b4dc6807c76b682fd5f4446d9bd038a45874c2d5c44bab56314274a4
-
Filesize
336B
MD54db9f8b6175722b62ececeeeba1ce307
SHA13b3ba8414706e72a6fa19e884a97b87609e11e47
SHA256d2150b9e5a4ce55e140f0ca91c4e300715d42095c8fddf58c77037cdd2cfaf78
SHA5121d6dc274cf7a3dd704f840e6a5ad57ab4c4e35d5f09489aeff520bb797e1c825bac53fc335156fe41e767a46520d031855fe42fe7b175409ebe5e9e986fb9b8b
-
Filesize
5.7MB
MD54e0fefb1f255c265695f8b60d1e4604e
SHA1c184677bff61e358dc040f4d60a4c1d5cafdbafd
SHA2560ecb48ec632900f1807b832be428c5b66b436c062c5c9b972dec8e7f29b0d561
SHA512fa3f0da899480aaa3c654448fb5b6b24cc90a2f5dde8bd38577fd1fb1a48f7dc08bb40d2c9affecfeb4cf93cb153c8893332f82c97f8289e6e98cfe13999c64a