Analysis
-
max time kernel
44s -
max time network
84s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
08/08/2024, 14:31
Static task
static1
Behavioral task
behavioral1
Sample
sahost.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
sahost.exe
Resource
win10v2004-20240802-en
General
-
Target
sahost.exe
-
Size
860KB
-
MD5
c79d8b7c07b992c6aa435e4101770f99
-
SHA1
110b1c6d43e4f66823273703921bd6129b8fd4db
-
SHA256
50e59bcfb26bd248b9d979be95aba9a034cc4481bd592c83f26fef033f8f83f0
-
SHA512
7a00f4ce09e001ad1f4b1538f9123f11b387ea068c8175c665fc93953cc07e9037854f828a21ab894953ed1d23a3739ae0ab07776a3d355164120e6cb6ec2ae4
-
SSDEEP
12288:G1c2iN7daCiBTips9RQ6ycYEe/xQCaxuIck24Dg4ObySlr54MOZ:G1c1teTipsvU26PklgE
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 2768 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sahost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language powershell.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName chrome.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer chrome.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2652 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2928 sahost.exe 2768 powershell.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of AdjustPrivilegeToken 22 IoCs
description pid Process Token: SeDebugPrivilege 2928 sahost.exe Token: SeDebugPrivilege 2768 powershell.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe Token: SeShutdownPrivilege 2660 chrome.exe -
Suspicious use of FindShellTrayWindow 34 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of SendNotifyMessage 32 IoCs
pid Process 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe 2660 chrome.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2928 wrote to memory of 2768 2928 sahost.exe 29 PID 2928 wrote to memory of 2768 2928 sahost.exe 29 PID 2928 wrote to memory of 2768 2928 sahost.exe 29 PID 2928 wrote to memory of 2768 2928 sahost.exe 29 PID 2928 wrote to memory of 2652 2928 sahost.exe 31 PID 2928 wrote to memory of 2652 2928 sahost.exe 31 PID 2928 wrote to memory of 2652 2928 sahost.exe 31 PID 2928 wrote to memory of 2652 2928 sahost.exe 31 PID 2928 wrote to memory of 2756 2928 sahost.exe 33 PID 2928 wrote to memory of 2756 2928 sahost.exe 33 PID 2928 wrote to memory of 2756 2928 sahost.exe 33 PID 2928 wrote to memory of 2756 2928 sahost.exe 33 PID 2928 wrote to memory of 2856 2928 sahost.exe 34 PID 2928 wrote to memory of 2856 2928 sahost.exe 34 PID 2928 wrote to memory of 2856 2928 sahost.exe 34 PID 2928 wrote to memory of 2856 2928 sahost.exe 34 PID 2928 wrote to memory of 2644 2928 sahost.exe 35 PID 2928 wrote to memory of 2644 2928 sahost.exe 35 PID 2928 wrote to memory of 2644 2928 sahost.exe 35 PID 2928 wrote to memory of 2644 2928 sahost.exe 35 PID 2928 wrote to memory of 2640 2928 sahost.exe 36 PID 2928 wrote to memory of 2640 2928 sahost.exe 36 PID 2928 wrote to memory of 2640 2928 sahost.exe 36 PID 2928 wrote to memory of 2640 2928 sahost.exe 36 PID 2928 wrote to memory of 2664 2928 sahost.exe 37 PID 2928 wrote to memory of 2664 2928 sahost.exe 37 PID 2928 wrote to memory of 2664 2928 sahost.exe 37 PID 2928 wrote to memory of 2664 2928 sahost.exe 37 PID 2660 wrote to memory of 2624 2660 chrome.exe 39 PID 2660 wrote to memory of 2624 2660 chrome.exe 39 PID 2660 wrote to memory of 2624 2660 chrome.exe 39 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41 PID 2660 wrote to memory of 2912 2660 chrome.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\sahost.exe"C:\Users\Admin\AppData\Local\Temp\sahost.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\YTGPfoyKQaU.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2768
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\YTGPfoyKQaU" /XML "C:\Users\Admin\AppData\Local\Temp\tmp2829.tmp"2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2652
-
-
C:\Users\Admin\AppData\Local\Temp\sahost.exe"C:\Users\Admin\AppData\Local\Temp\sahost.exe"2⤵PID:2756
-
-
C:\Users\Admin\AppData\Local\Temp\sahost.exe"C:\Users\Admin\AppData\Local\Temp\sahost.exe"2⤵PID:2856
-
-
C:\Users\Admin\AppData\Local\Temp\sahost.exe"C:\Users\Admin\AppData\Local\Temp\sahost.exe"2⤵PID:2644
-
-
C:\Users\Admin\AppData\Local\Temp\sahost.exe"C:\Users\Admin\AppData\Local\Temp\sahost.exe"2⤵PID:2640
-
-
C:\Users\Admin\AppData\Local\Temp\sahost.exe"C:\Users\Admin\AppData\Local\Temp\sahost.exe"2⤵PID:2664
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe"1⤵
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=crashpad-handler "--user-data-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\Admin\AppData\Local\Google\Chrome\User Data\Crashpad" "--metrics-dir=C:\Users\Admin\AppData\Local\Google\Chrome\User Data" --url=https://clients2.google.com/cr/report --annotation=channel= --annotation=plat=Win64 --annotation=prod=Chrome --annotation=ver=106.0.5249.119 --initial-client-data=0xc0,0xc4,0xc8,0x94,0xcc,0x7fefab39758,0x7fefab39768,0x7fefab397782⤵PID:2624
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --mojo-platform-channel-handle=1136 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:22⤵PID:2912
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=1496 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:82⤵PID:2820
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=storage.mojom.StorageService --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=1584 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:82⤵PID:2304
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --first-renderer-process --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=6 --mojo-platform-channel-handle=2200 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:12⤵PID:948
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=5 --mojo-platform-channel-handle=2208 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:12⤵PID:2060
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=gpu-process --gpu-preferences=UAAAAAAAAADgAAAYAAAAAAAAAAAAAAAAAABgAAAAAAAwAAAAAAAAAAAAAAAQAAAAAAAAAAAAAAAAAAAAAAAAAEgAAAAAAAAASAAAAAAAAAAYAAAAAgAAABAAAAAAAAAAGAAAAAAAAAAQAAAAAAAAAAAAAAAOAAAAEAAAAAAAAAABAAAADgAAAAgAAAAAAAAACAAAAAAAAAA= --use-gl=angle --use-angle=swiftshader-webgl --mojo-platform-channel-handle=1008 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:22⤵PID:1556
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --display-capture-permissions-policy-allowed --disable-gpu-compositing --lang=en-US --device-scale-factor=1 --num-raster-threads=4 --enable-main-frame-before-activation --renderer-client-id=8 --mojo-platform-channel-handle=1244 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:12⤵PID:1976
-
-
C:\Program Files\Google\Chrome\Application\chrome.exe"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.UtilWin --lang=en-US --service-sandbox-type=none --mojo-platform-channel-handle=3680 --field-trial-handle=1348,i,7516227870523428837,15127575513861900745,131072 /prefetch:82⤵PID:2576
-
-
C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"C:\Program Files\Google\Chrome\Application\106.0.5249.119\elevation_service.exe"1⤵PID:1500
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD578d989bb77c78ce6d9b27a403e2acf84
SHA1d78fa795a3d846de546b76fa2d80daa64dd1f64d
SHA256db59a372e09998127d703406de333c1cde657a9c07e238583b141eda45f31520
SHA512398a4062b818e01d3d430afe0aecb88b3d50153036e72f906021c0c7cf20eba7b956dd0d1f818b219878a140eb58c1acd3b7a3879d2d1baa5e279f3608f03057
-
Filesize
16B
MD518e723571b00fb1694a3bad6c78e4054
SHA1afcc0ef32d46fe59e0483f9a3c891d3034d12f32
SHA2568af72f43857550b01eab1019335772b367a17a9884a7a759fdf4fe6f272b90aa
SHA51243bb0af7d3984012d2d67ca6b71f0201e5b948e6fe26a899641c4c6f066c59906d468ddf7f1df5ea5fa33c2bc5ea8219c0f2c82e0a5c365ad7581b898a8859e2
-
Filesize
264KB
MD5f50f89a0a91564d0b8a211f8921aa7de
SHA1112403a17dd69d5b9018b8cede023cb3b54eab7d
SHA256b1e963d702392fb7224786e7d56d43973e9b9efd1b89c17814d7c558ffc0cdec
SHA512bf8cda48cf1ec4e73f0dd1d4fa5562af1836120214edb74957430cd3e4a2783e801fa3f4ed2afb375257caeed4abe958265237d6e0aacf35a9ede7a2e8898d58
-
Filesize
1KB
MD5bc148af0dcf889f173190c742c54182e
SHA1285afa2c2a266ab252a0a93b0d2a661560b6b9a7
SHA256e6b2d069e794e6e3ad1ccd340aef2fc7f2b2abbef12267a4302108c1462b55d9
SHA5124aefb443d0dd57f98da421069eef4b1175772ec24505ec86fc652b7f1006d7188824fcd2d593ae727ee516e49f1a68a8c7381aebff62994d8848175541362cad