Analysis
-
max time kernel
145s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
03/10/2024, 06:29
Static task
static1
Behavioral task
behavioral1
Sample
google_64.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
google_64.exe
Resource
win10v2004-20240802-en
General
-
Target
google_64.exe
-
Size
21.9MB
-
MD5
7f0d1df1b223a4fc990a4700ece2cc4e
-
SHA1
db3ad54de7a0aee48aa253a2a3aa1953b3717886
-
SHA256
a99617fe1fcbdad576a2fc91a990b99d0b4c48bbe2b2ccf7965293b7c96091e3
-
SHA512
fa50696c4aaba304724252c021e409dddc989045a96cc726a94281321c955f78b152789ae3045efaa07f2b1f7c9255d1332f69d7bcada752ad62964aa27e1bc7
-
SSDEEP
393216:nEzKufCTmBlwejWc9AVftZwwUUu/eWNyT55ybi5o2TXnH/SE9f3Wt8797mmwAB26:afCKlwOW68pxWNK5H5okXnH/SMf3uqmo
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 1588 google_64.tmp 2944 aslces.exe 568 svortvx8.exe 1416 svortvx8.exe 2820 svortvx8.exe 2280 svortvx8.exe 852 svortvx8.exe 1944 svortvx8.exe 1896 svortvx8.exe -
Loads dropped DLL 10 IoCs
pid Process 2792 google_64.exe 1588 google_64.tmp 1988 taskeng.exe 568 svortvx8.exe 1416 svortvx8.exe 2820 svortvx8.exe 2280 svortvx8.exe 852 svortvx8.exe 1944 svortvx8.exe 1896 svortvx8.exe -
Drops file in Windows directory 8 IoCs
description ioc Process File created C:\Windows\svortvx8\svortvx8.exe svortvx8.exe File opened for modification C:\Windows\svortvx8\svortvx8.exe svortvx8.exe File created C:\Windows\svortvx8\app-0.82.1\svortvx8.exe svortvx8.exe File opened for modification C:\Windows\svortvx8\app-0.82.1\svortvx8.exe svortvx8.exe File created C:\Windows\svortvx8\app-0.82.1\b5c24d98e1d8c41e9 svortvx8.exe File opened for modification C:\Windows\svortvx8\app-0.82.1\b5c24d98e1d8c41e9 svortvx8.exe File created C:\Windows\svortvx8\app-0.82.1\sqlite3.dll svortvx8.exe File opened for modification C:\Windows\svortvx8\app-0.82.1\sqlite3.dll svortvx8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language google_64.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language google_64.tmp Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svortvx8.exe -
Modifies data under HKEY_USERS 10 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication svortvx8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name = "svortvx8.exe" svortvx8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name = "svortvx8.exe" svortvx8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication svortvx8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name = "svortvx8.exe" svortvx8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name = "svortvx8.exe" svortvx8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication svortvx8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication svortvx8.exe Set value (str) \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Direct3D\MostRecentApplication\Name = "svortvx8.exe" svortvx8.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Direct3D\MostRecentApplication svortvx8.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1588 google_64.tmp 1588 google_64.tmp 852 svortvx8.exe 852 svortvx8.exe 852 svortvx8.exe 852 svortvx8.exe 852 svortvx8.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1588 google_64.tmp -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 2792 wrote to memory of 1588 2792 google_64.exe 28 PID 1988 wrote to memory of 568 1988 taskeng.exe 33 PID 1988 wrote to memory of 568 1988 taskeng.exe 33 PID 1988 wrote to memory of 568 1988 taskeng.exe 33 PID 568 wrote to memory of 1416 568 svortvx8.exe 34 PID 568 wrote to memory of 1416 568 svortvx8.exe 34 PID 568 wrote to memory of 1416 568 svortvx8.exe 34 PID 2816 wrote to memory of 2820 2816 cmd.exe 36 PID 2816 wrote to memory of 2820 2816 cmd.exe 36 PID 2816 wrote to memory of 2820 2816 cmd.exe 36 PID 2280 wrote to memory of 852 2280 svortvx8.exe 38 PID 2280 wrote to memory of 852 2280 svortvx8.exe 38 PID 2280 wrote to memory of 852 2280 svortvx8.exe 38 PID 2280 wrote to memory of 852 2280 svortvx8.exe 38 PID 852 wrote to memory of 1944 852 svortvx8.exe 39 PID 852 wrote to memory of 1944 852 svortvx8.exe 39 PID 852 wrote to memory of 1944 852 svortvx8.exe 39 PID 2820 wrote to memory of 1896 2820 svortvx8.exe 40 PID 2820 wrote to memory of 1896 2820 svortvx8.exe 40 PID 2820 wrote to memory of 1896 2820 svortvx8.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\google_64.exe"C:\Users\Admin\AppData\Local\Temp\google_64.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\is-RQUD3.tmp\google_64.tmp"C:\Users\Admin\AppData\Local\Temp\is-RQUD3.tmp\google_64.tmp" /SL5="$40150,21967330,775168,C:\Users\Admin\AppData\Local\Temp\google_64.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of FindShellTrayWindow
PID:1588
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {D2F16519-F779-4F90-A38D-D4BAF903E724} S-1-5-21-3533259084-2542256011-65585152-1000:XPAJOTIY\Admin:Interactive:[1]1⤵PID:2924
-
C:\Users\Admin\AppData\Roaming\8A5F63D6\ebaf2690\e80b16dd\aslces.exeC:\Users\Admin\AppData\Roaming\8A5F63D6\ebaf2690\e80b16dd\aslces.exe2⤵
- Executes dropped EXE
PID:2944
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {813E5F48-7500-46AE-86CD-4C8C6DAB1C9A} S-1-5-18:NT AUTHORITY\System:Service:1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exeC:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:568 -
C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exe"C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exe" 237f37c29 568 C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:1416
-
-
-
C:\Windows\system32\cmd.execmd /c start "" "C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exe" "8ac956b81" 1416 "C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\"1⤵
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exe"C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\svortvx8.exe" "8ac956b81" 1416 "C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\svortvx8\app-0.82.1\svortvx8.exeC:\Windows\svortvx8\app-0.82.1\svortvx8.exe fd6cd63fc7ca363d58948bdb26d0b 1416 "C:\Users\Admin\AppData\Roaming\8A5F63D6\8eb0ae0a3a3c\c1d6fe862d\"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
PID:1896
-
-
-
C:\Windows\svortvx8\svortvx8.exe"C:\Windows\svortvx8\svortvx8.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Windows\svortvx8\app-0.82.1\svortvx8.exe"C:\Windows\svortvx8\app-0.82.1\svortvx8.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:852 -
C:\Windows\svortvx8\app-0.82.1\svortvx8.exe"C:\Windows\svortvx8\app-0.82.1\svortvx8.exe" "96975b1c6f97969bfc8bef"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1944
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
13.7MB
MD56e7073cf8b63c208b7b4f75497212720
SHA1b2b1dd8dc37471b84a49d2f0fa560a5b00750a43
SHA2563d5ac4b831edf0ce2fe1ddf9e1cf3a37dec6d3fd084b5ff3f097f7afdc00cec6
SHA5129aeeab440f46f074cf52961da1022ebe7635c07d9556059239c16e92d640c685a97fe733d4b0b950912ea7b035a8f472aaca927bc26f1352d7d40c09b5548356
-
Filesize
2.9MB
MD51ad96797e4eb7d28f03f033d1f60a12c
SHA17a3ef33b7b2c16e2da916f7406cb2133de8ade48
SHA2564290b7f2a36af1095fc8d69f7a635cb993b08f8842e4d920083b7c20f3115c0d
SHA51206adda14bda8bf5868fea4d238654d52834522dc1e0ede6f513b9cd1e2fa3139b51dc73f9f533e28b03408eca034eea92e20885e762c9309ff59f0e8a4f90d76
-
Filesize
2.7MB
MD528c69723a9444abd989e4f5c0f344af1
SHA102557b8132ff68b6f7495e6f8bf9a136503dc9fd
SHA256bba58214f07330f12f5122d28b160eac1c2a4948dbd3905dc53aa9bc7a83b427
SHA512d924522b629454a6bd81f6843ba8248b8fb35c5e512223a83c82ad8f079f9c09059470ec7a3cbca2d6f0303c7e6335023365f883b64efd7ea6ef7a5da69e6fde
-
Filesize
691KB
MD5d0cd80eda106fc87730d2034e8c2d632
SHA14e6a0454867097a1966c9d9bd1af366cfe640baf
SHA256d53225a068e183b7c2bc3b48766551547ab0a679cfb9e2ddfd1602e041517fcb
SHA512fe362285e4ee767876156cb63859d41ff06cef04153f67c01bd29b082966216171cf1683f6bccf78faf7c3b380ffc5e951ee24f856edfee2edada2e6301122e5
-
Filesize
3.2MB
MD5dfcc3036dcb08cc6263be6b050ebf7f8
SHA146cb4ad17c4e2fc115b257dee31571c7ea7ff8d3
SHA2564dfd9825be93d672d011d1cdf2f6733721e0d30fed32d5ebbc0cf2ba8f42f248
SHA512c6e99dda493f71bf1ff001fe953867919ebbe794bd49e3e76293dbf470c3c995c91c7e8f5f8567f6ec43fc2362bb74cc9f4ff52aa2af91c8ad77115820acb082
-
Filesize
7.8MB
MD535a062855e514ce9121d9c30d57d2199
SHA17a74853b61b453febe66a77709850c12affccb4e
SHA2561732bd979accc746689600fafe3636b856be0568e9fa1f8fb40d1b60b15f8a90
SHA512e1bb4b9dee32f31598033dd0cd1dae81e0f5d62fdebe9932d38ed824de22a7812cd631c8bca6828cf94dbc2e78accb68ff88195faae710b2aa1e850b1e5e5569
-
Filesize
8.5MB
MD5f37c52156f0782a8396b5e95c3960363
SHA16e1f3d27aac555edbe5c83cfcdb6050e911bf937
SHA256a6c7d50a959dca5684d84c700c9a74591db7bef08f516ee15df4c05a9f675f5b
SHA51225cc70a70aee6e8e041a6d1dfb1cfae7796a6c86f5a29b250c4342b51ebcfd2724120cc33cc7e6bfe60ee4e7f91a8ba7b9eb2b95c0ffd87c4df875c76c74c980