Analysis
-
max time kernel
119s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
31-05-2024 02:43
Static task
static1
Behavioral task
behavioral1
Sample
820cd988df97ea0c180943b066cc8cd4.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
820cd988df97ea0c180943b066cc8cd4.exe
Resource
win10v2004-20240426-en
General
-
Target
820cd988df97ea0c180943b066cc8cd4.exe
-
Size
524KB
-
MD5
820cd988df97ea0c180943b066cc8cd4
-
SHA1
04fae8cf45b193382ffe5891e86ab7ad3d4be46c
-
SHA256
4e5a74d0131244f48e724e15596f31d4dfe515bb9671516c78564d7fcb67b9ee
-
SHA512
c492cd463c841c519b0dcd4d392270afd33adace9cc4d334d01c8989157bcd8f2140f83ed1698abf00bf897c9ae1c844c9695f9448116bad669e528742b9f329
-
SSDEEP
12288:kXNo92q8Fxta+MHzEqAL8BxrPKIkQXGU9zlnNW7:4Ni8Fx8+MHWLQPKIkQXGYBnNW7
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2840 կիյտյ.exe 3068 կիյտյ.exe 2004 կիյտյ.exe -
Loads dropped DLL 4 IoCs
pid Process 2224 820cd988df97ea0c180943b066cc8cd4.exe 2224 820cd988df97ea0c180943b066cc8cd4.exe 2840 կիյտյ.exe 2840 կիյտյ.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeTcbPrivilege 2004 կիյտյ.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2224 820cd988df97ea0c180943b066cc8cd4.exe 2840 կիյտյ.exe 3068 կիյտյ.exe 2004 կիյտյ.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2224 wrote to memory of 2840 2224 820cd988df97ea0c180943b066cc8cd4.exe 28 PID 2224 wrote to memory of 2840 2224 820cd988df97ea0c180943b066cc8cd4.exe 28 PID 2224 wrote to memory of 2840 2224 820cd988df97ea0c180943b066cc8cd4.exe 28 PID 2224 wrote to memory of 2840 2224 820cd988df97ea0c180943b066cc8cd4.exe 28 PID 2840 wrote to memory of 3068 2840 կիյտյ.exe 29 PID 2840 wrote to memory of 3068 2840 կիյտյ.exe 29 PID 2840 wrote to memory of 3068 2840 կիյտյ.exe 29 PID 2840 wrote to memory of 3068 2840 կիյտյ.exe 29 PID 3068 wrote to memory of 2652 3068 կիյտյ.exe 30 PID 3068 wrote to memory of 2652 3068 կիյտյ.exe 30 PID 3068 wrote to memory of 2652 3068 կիյտյ.exe 30 PID 3068 wrote to memory of 2652 3068 կիյտյ.exe 30 PID 3068 wrote to memory of 2652 3068 կիյտյ.exe 30 PID 3068 wrote to memory of 2652 3068 կիյտյ.exe 30 PID 1532 wrote to memory of 2004 1532 taskeng.exe 34 PID 1532 wrote to memory of 2004 1532 taskeng.exe 34 PID 1532 wrote to memory of 2004 1532 taskeng.exe 34 PID 1532 wrote to memory of 2004 1532 taskeng.exe 34 PID 2004 wrote to memory of 2740 2004 կիյտյ.exe 35 PID 2004 wrote to memory of 2740 2004 կիյտյ.exe 35 PID 2004 wrote to memory of 2740 2004 կիյտյ.exe 35 PID 2004 wrote to memory of 2740 2004 կիյտյ.exe 35 PID 2004 wrote to memory of 2740 2004 կիյտյ.exe 35 PID 2004 wrote to memory of 2740 2004 կիյտյ.exe 35 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\820cd988df97ea0c180943b066cc8cd4.exe"C:\Users\Admin\AppData\Local\Temp\820cd988df97ea0c180943b066cc8cd4.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\ProgramData\կիյտյ.exe"C:\ProgramData\կիյտյ.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exeC:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe4⤵PID:2652
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {7A68F05B-2729-432B-AB89-A74C83E8871B} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exeC:\Users\Admin\AppData\Roaming\speedlink\կիյտյ.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2004 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe3⤵PID:2740
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-330940541-141609230-1670313778-1000\0f5007522459c86e95ffcc62f32308f1_4456596e-0528-4680-8940-5edc26c0ff50
Filesize1KB
MD5c0bffaa39723604da91253e2ee618462
SHA16e0d13184dfdf15ccfc3032ecb4ae43b916c33ad
SHA2567edcd2871d91f6be96281e867dda77d77eec76ba73343d3c027d171fbe5d1eac
SHA5129b76d9d9041a30419074c341ae25faf87a645c38c55b525e3e8853cd19fd9e88b426dd1916d08f13547031cbcaaecf955cd40b3ffb4d33c8c737311a323e0e73
-
Filesize
524KB
MD5820cd988df97ea0c180943b066cc8cd4
SHA104fae8cf45b193382ffe5891e86ab7ad3d4be46c
SHA2564e5a74d0131244f48e724e15596f31d4dfe515bb9671516c78564d7fcb67b9ee
SHA512c492cd463c841c519b0dcd4d392270afd33adace9cc4d334d01c8989157bcd8f2140f83ed1698abf00bf897c9ae1c844c9695f9448116bad669e528742b9f329