Analysis
-
max time kernel
150s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
18-07-2024 02:26
Static task
static1
Behavioral task
behavioral1
Sample
502d38dcae1338df8a354aa91b914718.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
502d38dcae1338df8a354aa91b914718.exe
Resource
win10v2004-20240709-en
General
-
Target
502d38dcae1338df8a354aa91b914718.exe
-
Size
138KB
-
MD5
502d38dcae1338df8a354aa91b914718
-
SHA1
7bbe105fe9b441487cf80da7ea0190c42edae83b
-
SHA256
d00fd88e780163fd9d282edc5bf0788fb0533fa99605e86561477fe337467b89
-
SHA512
a0ad108d758cab8f517cc967e8aaa7f4c8a1e1b740f2b8c99ecee723d7e8cc2b8c0586ed72c777b1fb92bb307afb889d458d7290e0950d133a17d1de373f4bcf
-
SSDEEP
3072:lu8fPAknITDcn8bhLw5YHJrDfqp3rLIIZjyCPS8/1cDNr/QyAsrCEl:luOPALk+hLw5YHQpPNjF/+DNbjrN
Malware Config
Extracted
latentbot
crackseller.zapto.org
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 2808 oxan.exe -
Loads dropped DLL 2 IoCs
pid Process 2704 502d38dcae1338df8a354aa91b914718.exe 2704 502d38dcae1338df8a354aa91b914718.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940600906-3464502421-4240639183-1000\Software\Microsoft\Windows\CurrentVersion\Run\{AAAC7B9E-414E-15C9-85C5-C0F80B658ACE} = "C:\\Users\\Admin\\AppData\\Roaming\\Saxih\\oxan.exe" oxan.exe -
Suspicious behavior: EnumeratesProcesses 35 IoCs
pid Process 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe 2808 oxan.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSecurityPrivilege 2704 502d38dcae1338df8a354aa91b914718.exe -
Suspicious use of WriteProcessMemory 49 IoCs
description pid Process procid_target PID 2704 wrote to memory of 2808 2704 502d38dcae1338df8a354aa91b914718.exe 31 PID 2704 wrote to memory of 2808 2704 502d38dcae1338df8a354aa91b914718.exe 31 PID 2704 wrote to memory of 2808 2704 502d38dcae1338df8a354aa91b914718.exe 31 PID 2704 wrote to memory of 2808 2704 502d38dcae1338df8a354aa91b914718.exe 31 PID 2808 wrote to memory of 1092 2808 oxan.exe 19 PID 2808 wrote to memory of 1092 2808 oxan.exe 19 PID 2808 wrote to memory of 1092 2808 oxan.exe 19 PID 2808 wrote to memory of 1092 2808 oxan.exe 19 PID 2808 wrote to memory of 1092 2808 oxan.exe 19 PID 2808 wrote to memory of 1172 2808 oxan.exe 20 PID 2808 wrote to memory of 1172 2808 oxan.exe 20 PID 2808 wrote to memory of 1172 2808 oxan.exe 20 PID 2808 wrote to memory of 1172 2808 oxan.exe 20 PID 2808 wrote to memory of 1172 2808 oxan.exe 20 PID 2808 wrote to memory of 1204 2808 oxan.exe 21 PID 2808 wrote to memory of 1204 2808 oxan.exe 21 PID 2808 wrote to memory of 1204 2808 oxan.exe 21 PID 2808 wrote to memory of 1204 2808 oxan.exe 21 PID 2808 wrote to memory of 1204 2808 oxan.exe 21 PID 2808 wrote to memory of 1540 2808 oxan.exe 23 PID 2808 wrote to memory of 1540 2808 oxan.exe 23 PID 2808 wrote to memory of 1540 2808 oxan.exe 23 PID 2808 wrote to memory of 1540 2808 oxan.exe 23 PID 2808 wrote to memory of 1540 2808 oxan.exe 23 PID 2808 wrote to memory of 2704 2808 oxan.exe 30 PID 2808 wrote to memory of 2704 2808 oxan.exe 30 PID 2808 wrote to memory of 2704 2808 oxan.exe 30 PID 2808 wrote to memory of 2704 2808 oxan.exe 30 PID 2808 wrote to memory of 2704 2808 oxan.exe 30 PID 2808 wrote to memory of 1792 2808 oxan.exe 32 PID 2808 wrote to memory of 1792 2808 oxan.exe 32 PID 2808 wrote to memory of 1792 2808 oxan.exe 32 PID 2808 wrote to memory of 1792 2808 oxan.exe 32 PID 2808 wrote to memory of 1792 2808 oxan.exe 32 PID 2808 wrote to memory of 1984 2808 oxan.exe 33 PID 2808 wrote to memory of 1984 2808 oxan.exe 33 PID 2808 wrote to memory of 1984 2808 oxan.exe 33 PID 2808 wrote to memory of 1984 2808 oxan.exe 33 PID 2808 wrote to memory of 1984 2808 oxan.exe 33 PID 2808 wrote to memory of 1304 2808 oxan.exe 34 PID 2808 wrote to memory of 1304 2808 oxan.exe 34 PID 2808 wrote to memory of 1304 2808 oxan.exe 34 PID 2808 wrote to memory of 1304 2808 oxan.exe 34 PID 2808 wrote to memory of 1304 2808 oxan.exe 34 PID 2808 wrote to memory of 2480 2808 oxan.exe 35 PID 2808 wrote to memory of 2480 2808 oxan.exe 35 PID 2808 wrote to memory of 2480 2808 oxan.exe 35 PID 2808 wrote to memory of 2480 2808 oxan.exe 35 PID 2808 wrote to memory of 2480 2808 oxan.exe 35
Processes
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1092
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1172
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1204
-
C:\Users\Admin\AppData\Local\Temp\502d38dcae1338df8a354aa91b914718.exe"C:\Users\Admin\AppData\Local\Temp\502d38dcae1338df8a354aa91b914718.exe"2⤵
- Loads dropped DLL
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Users\Admin\AppData\Roaming\Saxih\oxan.exe"C:\Users\Admin\AppData\Roaming\Saxih\oxan.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2808
-
-
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}1⤵PID:1540
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1792
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1984
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:1304
-
C:\Windows\system32\DllHost.exeC:\Windows\system32\DllHost.exe /Processid:{F9717507-6651-4EDB-BFF7-AE615179BCCF}1⤵PID:2480
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
138KB
MD5d3222ad698bb4463461d395af2ae0907
SHA19783e82a95f9740ec05506362e20e8fe8e925411
SHA2561844f46fd044aa488e670d32287476adc73c4018a40a2a583881bbba4f1746df
SHA512320f30a7c5ad173aa62de7eeca994cc6c85fe1617ef3f642e8831ae8d916e11daa18c7ed925288ae81a9066481ebd9e23740486192e60fd33a73b1897cf31295