Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240705-en -
resource tags
arch:x64arch:x86image:win7-20240705-enlocale:en-usos:windows7-x64system -
submitted
16/07/2024, 00:24
Static task
static1
Behavioral task
behavioral1
Sample
37daff180a5df0e6fc0a3bdfd3c50be0N.exe
Resource
win7-20240705-en
Behavioral task
behavioral2
Sample
37daff180a5df0e6fc0a3bdfd3c50be0N.exe
Resource
win10v2004-20240709-en
General
-
Target
37daff180a5df0e6fc0a3bdfd3c50be0N.exe
-
Size
33KB
-
MD5
37daff180a5df0e6fc0a3bdfd3c50be0
-
SHA1
a8ef4e8bbc345ee7ac6aa5f97a9d393358d07469
-
SHA256
5be5567bf68538c144fbb98ad87587d950de27e6ca0add0dd5621677f3e8db9f
-
SHA512
e5de1fdd329cad33811c72b7e220d14022d0c8bb0a0c2ef36ccf8ade99992ad1d2cc8971bbc03b1a598f1d6b1b173c2873ddef9ea0ef1bf10c23cb67ebcf800e
-
SSDEEP
384:L1YRmUcx7rmZ5Rg3OTnmn7NxMQFeBTySNfHKDRa7vvxlLRKDglglKDltltl/:LCRfCvm23OTnm7NSBTyS5qDRa7DrtlH/
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
pid Process 2148 attrib.exe -
Deletes itself 1 IoCs
pid Process 2972 cmd.exe -
Executes dropped EXE 1 IoCs
pid Process 2760 scchost.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\Debug\scchost.exe attrib.exe File created C:\Windows\Debug\scchost.exe 37daff180a5df0e6fc0a3bdfd3c50be0N.exe File opened for modification C:\Windows\Debug\scchost.exe 37daff180a5df0e6fc0a3bdfd3c50be0N.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 scchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz scchost.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeIncBasePriorityPrivilege 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2372 wrote to memory of 2148 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 31 PID 2372 wrote to memory of 2148 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 31 PID 2372 wrote to memory of 2148 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 31 PID 2372 wrote to memory of 2148 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 31 PID 2372 wrote to memory of 2972 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 34 PID 2372 wrote to memory of 2972 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 34 PID 2372 wrote to memory of 2972 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 34 PID 2372 wrote to memory of 2972 2372 37daff180a5df0e6fc0a3bdfd3c50be0N.exe 34 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 2148 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\37daff180a5df0e6fc0a3bdfd3c50be0N.exe"C:\Users\Admin\AppData\Local\Temp\37daff180a5df0e6fc0a3bdfd3c50be0N.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Windows\SysWOW64\attrib.exeattrib +a +s +h +r C:\Windows\Debug\scchost.exe2⤵
- Sets file to hidden
- Drops file in Windows directory
- Views/modifies file attributes
PID:2148
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c del C:\Users\Admin\AppData\Local\Temp\37DAFF~1.EXE > nul2⤵
- Deletes itself
PID:2972
-
-
C:\Windows\Debug\scchost.exeC:\Windows\Debug\scchost.exe1⤵
- Executes dropped EXE
- Checks processor information in registry
PID:2760
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
33KB
MD56185ad699426372c759ad868303702c0
SHA163b7a3d9412d031125be68eb9039db493db3f333
SHA25696602939ca6336fdd787e2bf4cb17213189c8b59e6abad5c1769b5aded55bff9
SHA51210d582ea313f9cac333d565faf2d085e775cca0a87e28da25b61c38d6325232b04e22a8cd60731c8285cf8579d03a1c9a6b05522a3f81d9dd35f93b4cedafb49