Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-1703_x64 -
resource
win10-20240611-en -
resource tags
arch:x64arch:x86image:win10-20240611-enlocale:en-usos:windows10-1703-x64system -
submitted
15-09-2024 17:34
Behavioral task
behavioral1
Sample
stub.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
stub.exe
Resource
win7-20240704-en
Behavioral task
behavioral3
Sample
svchost.exe
Resource
win10-20240611-en
Behavioral task
behavioral4
Sample
svchost.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
win-xworm-builder.exe
Resource
win10-20240404-en
General
-
Target
svchost.exe
-
Size
1.1MB
-
MD5
b712b99d538d008e8143133ac693ef51
-
SHA1
cfc1258686f1a225d2135ed6c0732baf63ca669d
-
SHA256
070d3e2a7c22c669354fbe8fe40f411f26b247c5077049f2b8e51d702ea0f730
-
SHA512
f0a1f78761d334bf71ab19f862950541853a52191f2b5709a351094ca116929b46965c8d5c6b1b0a4a2ef0651407a37a8550d8d26254619f9f4f5352419bb72a
-
SSDEEP
24576:0RmJkcoQricOIQxiZY1iaJPxDnQTaBCoBunYWb5LtIu:RJZoQrbTFZY1iaJPxD4XwQt9
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1453213197-474736321-1741884505-1000\Software\Microsoft\Windows\CurrentVersion\Run\SDAPYO = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\svchost.exe\"" svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svchost.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4756 svchost.exe 4756 svchost.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4756 svchost.exe