Analysis
-
max time kernel
149s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
13-09-2024 06:52
Static task
static1
Behavioral task
behavioral1
Sample
c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe
Resource
win10v2004-20240802-en
General
-
Target
c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe
-
Size
7.3MB
-
MD5
c8684ee7ce9838120714f400b1a42021
-
SHA1
9a294842f4d34b59cfb074f36f3a2c261592a20e
-
SHA256
c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2
-
SHA512
613ee146df8dc41e7d93fe7948749c888a3a29ce3b4fb37961eda04e207d27924d4a89ba7ee543331e1abdbf778cb14686f18c85f18ed7d49be64bc4b8702dc3
-
SSDEEP
98304:qvu6o3Rsb0Bs9WZDPu1CESK2YwKRWi7VjlcQu:2sjmTRsQj1u
Malware Config
Signatures
-
resource yara_rule behavioral1/memory/2904-14-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2904-7-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2904-4-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2904-3-0x0000000180000000-0x0000000180019000-memory.dmp upx behavioral1/memory/2904-0-0x0000000180000000-0x0000000180019000-memory.dmp upx -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2272 set thread context of 2276 2272 XXEmulator.exe 31 PID 860 set thread context of 2608 860 svchost.exe 35 PID 2608 set thread context of 1000 2608 svchost.exe 36 -
Drops file in Windows directory 1 IoCs
description ioc Process File opened for modification C:\Windows\appcompat\programs\RecentFileCache.bcf svchost.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\SYSTEM\CENTRALPROCESSOR\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CENTRALPROCESSOR\0\~MHZ svchost.exe -
Modifies data under HKEY_USERS 6 IoCs
description ioc Process Set value (int) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit\Version = "7" svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\ActiveMovie\devenum 64-bit svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie svchost.exe Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\ActiveMovie\devenum 64-bit svchost.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 2272 XXEmulator.exe 2272 XXEmulator.exe 2272 XXEmulator.exe 2276 svchost.exe 2276 svchost.exe 2880 XXEmulator.exe 2880 XXEmulator.exe 2880 XXEmulator.exe 860 svchost.exe 860 svchost.exe 2608 svchost.exe 1000 dllhost.exe 1000 dllhost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 1000 dllhost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe 2608 svchost.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2276 svchost.exe Token: SeTcbPrivilege 2276 svchost.exe Token: SeAuditPrivilege 860 svchost.exe -
Suspicious use of WriteProcessMemory 29 IoCs
description pid Process procid_target PID 2904 wrote to memory of 1256 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 20 PID 2904 wrote to memory of 1256 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 20 PID 2904 wrote to memory of 1256 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 20 PID 2904 wrote to memory of 1256 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 20 PID 2904 wrote to memory of 1256 2904 c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe 20 PID 2272 wrote to memory of 2276 2272 XXEmulator.exe 31 PID 2272 wrote to memory of 2276 2272 XXEmulator.exe 31 PID 2272 wrote to memory of 2276 2272 XXEmulator.exe 31 PID 2272 wrote to memory of 2276 2272 XXEmulator.exe 31 PID 2272 wrote to memory of 2276 2272 XXEmulator.exe 31 PID 2272 wrote to memory of 2276 2272 XXEmulator.exe 31 PID 3000 wrote to memory of 2880 3000 taskeng.exe 33 PID 3000 wrote to memory of 2880 3000 taskeng.exe 33 PID 3000 wrote to memory of 2880 3000 taskeng.exe 33 PID 2880 wrote to memory of 860 2880 XXEmulator.exe 13 PID 2880 wrote to memory of 860 2880 XXEmulator.exe 13 PID 2880 wrote to memory of 860 2880 XXEmulator.exe 13 PID 860 wrote to memory of 2608 860 svchost.exe 35 PID 860 wrote to memory of 2608 860 svchost.exe 35 PID 860 wrote to memory of 2608 860 svchost.exe 35 PID 860 wrote to memory of 2608 860 svchost.exe 35 PID 860 wrote to memory of 2608 860 svchost.exe 35 PID 860 wrote to memory of 2608 860 svchost.exe 35 PID 2608 wrote to memory of 1000 2608 svchost.exe 36 PID 2608 wrote to memory of 1000 2608 svchost.exe 36 PID 2608 wrote to memory of 1000 2608 svchost.exe 36 PID 2608 wrote to memory of 1000 2608 svchost.exe 36 PID 2608 wrote to memory of 1000 2608 svchost.exe 36 PID 2608 wrote to memory of 1000 2608 svchost.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs1⤵
- Suspicious use of SetThreadContext
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:860 -
C:\Windows\system32\taskeng.exetaskeng.exe {5B599019-CEC4-4D8A-A5AA-793DFE68DEE2} S-1-5-18:NT AUTHORITY\System:Service:2⤵
- Suspicious use of WriteProcessMemory
PID:3000 -
C:\Program Files\Windows Mail\XXEmulator.exe"C:\Program Files\Windows Mail\XXEmulator.exe" -svc3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2880
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵
- Suspicious use of SetThreadContext
- Checks processor information in registry
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Windows\system32\dllhost.exeC:\Windows\system32\dllhost.exe /Processid:{F8284233-48F4-4680-ADDD-F8284233}3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
-
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1256
-
C:\Users\Admin\AppData\Local\Temp\c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe"C:\Users\Admin\AppData\Local\Temp\c692b403c37b6e1627c1de6282e7244f8d22fe9422d0a98ed0e81b449486d5f2.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\XXEmulator.exe"C:\Users\Admin\AppData\Local\Temp\XXEmulator.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -Install3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
-