Resubmissions
09-10-2024 10:14
241009-l9pd2asgjh 1009-10-2024 08:46
241009-kpetesvckf 1009-10-2024 08:45
241009-knpbgavbmf 1025-09-2024 13:48
240925-q4jc2ssaka 10Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
09-10-2024 08:46
Static task
static1
Behavioral task
behavioral1
Sample
AvastSvcZEg.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
AvastSvcZEg.zip
Resource
win10v2004-20241007-en
General
-
Target
AvastSvcZEg.zip
-
Size
154KB
-
MD5
4672c97ef72cfa9845126c6c19a0303d
-
SHA1
a64ca5018acb426de38f2b20ff9be956d6c35600
-
SHA256
47521a28f2aec3de8db28f63a88f3af567f7e40228acc5924673f23cd039199f
-
SHA512
7943fe72e1f16ea034f781abe92b415118987ce87c1f74ae98cf4fcccd976c1622f935d2b211ef9c9a827d18af4c8214a738a254f63aa61de44bf707e7a0a433
-
SSDEEP
3072:jLGN6+o/5GJB8YoaxwbybSNqnjdNArfqesO89pVBvDjvKWU7bK6GWQ:/G/2ooPHc2yesR9xDTKWU7prQ
Malware Config
Extracted
plugx
103.56.53.46:80
103.56.53.46:110
103.56.53.46:443
103.56.53.46:5938
-
folder
AvastSvcZEg
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2872 AvastSvc.exe 2252 AvastSvc.exe -
Loads dropped DLL 5 IoCs
pid Process 2072 AvastSvc.exe 2072 AvastSvc.exe 2872 AvastSvc.exe 2960 AvastSvc.exe 2252 AvastSvc.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AvastSvcZEg = "\"C:\\ProgramData\\AvastSvcZEg\\AvastSvc.exe\" 849" AvastSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\AvastSvcZEg = "\"C:\\ProgramData\\AvastSvcZEg\\AvastSvc.exe\" 849" AvastSvc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AvastSvcZEg = "\"C:\\ProgramData\\AvastSvcZEg\\AvastSvc.exe\" 745" AvastSvc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000\Software\Microsoft\Windows\CurrentVersion\Run\AvastSvcZEg = "\"C:\\ProgramData\\AvastSvcZEg\\AvastSvc.exe\" 745" AvastSvc.exe -
Enumerates connected drives 3 TTPs 2 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\D: AvastSvc.exe File opened (read-only) \??\F: AvastSvc.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AvastSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AvastSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AvastSvc.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AvastSvc.exe -
Modifies registry class 7 IoCs
description ioc Process Set value (data) \REGISTRY\MACHINE\SOFTWARE\Classes\ms-pu\CLSID = 45004300430033003200380044003300390041003200340037003200360041000000 AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu\PROXY AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu AvastSvc.exe Key created \REGISTRY\MACHINE\Software\CLASSES\ms-pu AvastSvc.exe Key created \REGISTRY\USER\S-1-5-21-3063565911-2056067323-3330884624-1000_CLASSES\ms-pu AvastSvc.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2872 AvastSvc.exe 2872 AvastSvc.exe 2872 AvastSvc.exe 2872 AvastSvc.exe 2872 AvastSvc.exe 2872 AvastSvc.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2872 AvastSvc.exe Token: SeDebugPrivilege 2872 AvastSvc.exe Token: SeTcbPrivilege 2872 AvastSvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2072 wrote to memory of 2872 2072 AvastSvc.exe 35 PID 2072 wrote to memory of 2872 2072 AvastSvc.exe 35 PID 2072 wrote to memory of 2872 2072 AvastSvc.exe 35 PID 2072 wrote to memory of 2872 2072 AvastSvc.exe 35 PID 2960 wrote to memory of 2252 2960 AvastSvc.exe 38 PID 2960 wrote to memory of 2252 2960 AvastSvc.exe 38 PID 2960 wrote to memory of 2252 2960 AvastSvc.exe 38 PID 2960 wrote to memory of 2252 2960 AvastSvc.exe 38
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\AvastSvcZEg.zip1⤵PID:2380
-
C:\Windows\explorer.exe"C:\Windows\explorer.exe"1⤵PID:2684
-
C:\AvastSvcZEg\AvastSvc.exe"C:\AvastSvcZEg\AvastSvc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\ProgramData\AvastSvcZEg\AvastSvc.exeC:\ProgramData\AvastSvcZEg\AvastSvc.exe 7452⤵
- Executes dropped EXE
- Loads dropped DLL
- Enumerates connected drives
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2872
-
-
C:\AvastSvcZEg\AvastSvc.exe"C:\AvastSvcZEg\AvastSvc.exe"1⤵
- Loads dropped DLL
- Adds Run key to start application
- System Location Discovery: System Language Discovery
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\ProgramData\AvastSvcZEg\AvastSvc.exeC:\ProgramData\AvastSvcZEg\AvastSvc.exe 8492⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Modifies registry class
PID:2252
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
160KB
MD553830fe278811363f93e0906d8b5ce69
SHA1b133578af848e10500cc8b943483ed71e86a713a
SHA2568ec409c1537e3030405bc8f8353d2605d1e88f1b245554383682f3aa8b5100ec
SHA512c87497b49d2924be200053495074e16d82fdc875ecdcd231e185479901020c176c2a478c52eea55a9908fe3605ed3d5b2037fa4c83248d4d2bfea45f9f03dc37
-
Filesize
52KB
MD5831252e7fa9bd6fa174715647ebce516
SHA1bf8c5bf141f0db53000805f2629e6e031d137ceb
SHA2566491c646397025bf02709f1bd3025f1622abdc89b550ac38ce6fac938353b954
SHA5120be6e898dcb75b32358bb8c2214e7b9453034ecfbe71d092df75b186a28f97ae7d5737f010b9d9e781c6b4cf3da19ee4a7cf5002604d23c527c55a3f7a0dba04
-
Filesize
60KB
MD5a72036f635cecf0dcb1e9c6f49a8fa5b
SHA1049813b955db1dd90952657ae2bd34250153563e
SHA25685ca20eeec3400c68a62639a01928a5dab824d2eadf589e5cbfe5a2bc41d9654
SHA512e3582e0969361d272c2469ce139ec809b9b0ac98fbc5eb5bb287442aed4c6ba69ed8175b68970751c93730cfaf07b75c3bc5e4e24aeda8f984b24f33bb8e3da2