Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240729-en -
resource tags
arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:30
Static task
static1
Behavioral task
behavioral1
Sample
91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe
Resource
win10v2004-20240802-en
General
-
Target
91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe
-
Size
1.8MB
-
MD5
98c1a12ce79248bbdb4c8a65fc227e58
-
SHA1
259ae7a3d239a352db772433075f649d5fbda8e7
-
SHA256
91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8
-
SHA512
a08eb3182c8cc7b3cc7880ff644de60951a3476dd0325b63d306f1c7f48cde40d21bfa76d85a23c6a6f545f16b30d99372f8bfb876d1c1ae928ad75e713a8c7e
-
SSDEEP
49152:tTvC/MTQYxsWR7a05iPEgLwJqejB/aWN7vaYz:BjTQYxsWR3gMJqWaAJ
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2260 ._cache_svchost.exe 2868 Synaptics.exe -
Loads dropped DLL 3 IoCs
pid Process 2100 svchost.exe 2100 svchost.exe 2100 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\Synaptics Pointing Device Driver = "C:\\ProgramData\\Synaptics\\Synaptics.exe" svchost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2536 set thread context of 2100 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 31 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 2260 ._cache_svchost.exe 2260 ._cache_svchost.exe 2260 ._cache_svchost.exe 2260 ._cache_svchost.exe 2260 ._cache_svchost.exe 2260 ._cache_svchost.exe 2260 ._cache_svchost.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
pid Process 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe -
Suspicious use of FindShellTrayWindow 10 IoCs
pid Process 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe -
Suspicious use of SendNotifyMessage 10 IoCs
pid Process 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2536 wrote to memory of 2100 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 31 PID 2536 wrote to memory of 2100 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 31 PID 2536 wrote to memory of 2100 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 31 PID 2536 wrote to memory of 2100 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 31 PID 2536 wrote to memory of 2100 2536 91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe 31 PID 2100 wrote to memory of 2260 2100 svchost.exe 32 PID 2100 wrote to memory of 2260 2100 svchost.exe 32 PID 2100 wrote to memory of 2260 2100 svchost.exe 32 PID 2100 wrote to memory of 2260 2100 svchost.exe 32 PID 2100 wrote to memory of 2868 2100 svchost.exe 33 PID 2100 wrote to memory of 2868 2100 svchost.exe 33 PID 2100 wrote to memory of 2868 2100 svchost.exe 33 PID 2100 wrote to memory of 2868 2100 svchost.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe"C:\Users\Admin\AppData\Local\Temp\91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious behavior: MapViewOfSection
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Windows\SysWOW64\svchost.exe"C:\Users\Admin\AppData\Local\Temp\91b60b1ae0b37343c671b632eb3e358d9a5029c9c6405556ba835528c67fd6d8.exe"2⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\._cache_svchost.exe"C:\Users\Admin\AppData\Local\Temp\._cache_svchost.exe"3⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:2260
-
-
C:\ProgramData\Synaptics\Synaptics.exe"C:\ProgramData\Synaptics\Synaptics.exe" InjUpdate3⤵
- Executes dropped EXE
PID:2868
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
20KB
MD554a47f6b5e09a77e61649109c6a08866
SHA14af001b3c3816b860660cf2de2c0fd3c1dfb4878
SHA256121118a0f5e0e8c933efd28c9901e54e42792619a8a3a6d11e1f0025a7324bc2
SHA51288ee0ef5af1b0b38c19ab4c307636352fc403ea74f3bfb17e246f7fd815ac042183086133cd9fe805bd47e15854776871bb7d384e419862c91503eeb82bfb419
-
Filesize
280KB
MD58a4835835c59fdb159cf2f3ef7cf2907
SHA143ef2c70461814ea5bb6ae7ea6f28f3e6b9b87b2
SHA2564e1eccc2e1ab923f3a969538565e31c6ecb3dc61207d6cd2107f2fb002cfdd83
SHA512137e9fba7db3e6aa3b9c49e93f60e0896fc7918dd79410bf31fc6b43d9c3539b00d79fdc1557d2f017efa590d6383cffe21dfa2ea9b31141cd0afd03f466dabe