Overview
overview
10Static
static
100486218577...d9.exe
windows7-x64
109bfd15145...11.exe
windows7-x64
9141d93e2d4...aa.exe
windows7-x64
1016c2807567...55.exe
windows7-x64
32f41c73046...95.exe
windows7-x64
103e275093a5...01.exe
windows7-x64
10419a809f42...89.exe
windows7-x64
34b10fd0d5e...58.exe
windows7-x64
104d78c439ed...f7.exe
windows7-x64
74f7713dcf8...63.exe
windows7-x64
7597deecbe6...4d.exe
windows7-x64
76b59edf464...e8.exe
windows7-x64
87def3cd43d...d8.exe
windows7-x64
796ba85326e...8a.exe
windows7-x64
797f1b6afb2...2e.exe
windows7-x64
59906747639...1e.exe
windows7-x64
19e1609ab7f...08.exe
windows7-x64
10b7fc91fc1f...37.exe
windows7-x64
7bf179bbd2c...25.exe
windows7-x64
3cfc68c40f4...4f.exe
windows7-x64
6e6e948a0aa...eb.exe
windows7-x64
1f02fe52119...68.exe
windows7-x64
8$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ss.dll
windows7-x64
3secrehosted.exe
windows7-x64
3Analysis
-
max time kernel
148s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
27-11-2024 09:28
Behavioral task
behavioral1
Sample
04862185775476ae0b6f7e8a02133cb408d212ca17bbff5c20dcfdcf569b3dd9.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
09bfd15145c9d8e39f99d3dfe98337a8c488dc334dfe195d27bdeb5b2459fd11.exe
Resource
win7-20240903-en
Behavioral task
behavioral3
Sample
141d93e2d408738bba4f523f60d6ead702424e7d62c34921c8a34150a31870aa.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
16c2807567b31c30288d92c0649ce78ea87434104bac72db407bb45bf65a4855.exe
Resource
win7-20240903-en
Behavioral task
behavioral5
Sample
2f41c73046f3b0f5edd79ae089b6b64ec3a0812ea02fe7325b8e5b171a621c95.exe
Resource
win7-20241010-en
Behavioral task
behavioral6
Sample
3e275093a5ad4b2083eda47dfd2e9053cae044f7990a323c6f649093a8d00901.exe
Resource
win7-20240903-en
Behavioral task
behavioral7
Sample
419a809f42361b2fcff98eb6f201e54ecef532c9b378db06e999f54285032889.exe
Resource
win7-20240903-en
Behavioral task
behavioral8
Sample
4b10fd0d5e4370dde456862f810e27b2be1f854356191b9893ab1a65f4af5358.exe
Resource
win7-20240903-en
Behavioral task
behavioral9
Sample
4d78c439ed8860a14aebcf79dfef27047a51fc36c514b40b48724cd9340ff6f7.exe
Resource
win7-20240903-en
Behavioral task
behavioral10
Sample
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe
Resource
win7-20240903-en
Behavioral task
behavioral11
Sample
597deecbe673c67d998825bdf4ddeca83f6fbb3bdccec91dabf4f9052713ac4d.exe
Resource
win7-20240903-en
Behavioral task
behavioral12
Sample
6b59edf464eaaeac4f4b2f43474e573694429f08c448db770618dc574b6171e8.exe
Resource
win7-20240903-en
Behavioral task
behavioral13
Sample
7def3cd43d98a30a04f09be284cab8b8dbf96ecc2e78302f6c45ad524c41d7d8.exe
Resource
win7-20240903-en
Behavioral task
behavioral14
Sample
96ba85326e2250f4e1cf07f5981bb96ea1383901663a6354899b5da0cd77b98a.exe
Resource
win7-20241010-en
Behavioral task
behavioral15
Sample
97f1b6afb24cda22203275fc34bd07ba51170729edba8ee67bdb66a529574a2e.exe
Resource
win7-20240903-en
Behavioral task
behavioral16
Sample
9906747639b782d738555a2522acd4a09ca8a3356f7848a4e68f284d888d891e.exe
Resource
win7-20240708-en
Behavioral task
behavioral17
Sample
9e1609ab7f01b56a9476494d9b3bf5997380d466744b07ec5d9b20e416b10f08.exe
Resource
win7-20240903-en
Behavioral task
behavioral18
Sample
b7fc91fc1fa6a53b1e5d97e21a7abefbde3ca7349d4db0fdbe15ec2702b1b737.exe
Resource
win7-20240903-en
Behavioral task
behavioral19
Sample
bf179bbd2ce7ca31e421334efa7d262e30dc16b9bb5cced1b8b18d119adc4425.exe
Resource
win7-20241010-en
Behavioral task
behavioral20
Sample
cfc68c40f4631954894898633fd0c5a06c5ce5837eba7d4b56fc3514c01e124f.exe
Resource
win7-20241023-en
Behavioral task
behavioral21
Sample
e6e948a0aa3605bbd636ccdfa56e771dfebafa1e150d84f96b1968f8803edbeb.exe
Resource
win7-20240729-en
Behavioral task
behavioral22
Sample
f02fe52119ff47fed2e52b28ec2c42a8eae8233b4c588c310dbaef3297b5d768.exe
Resource
win7-20240903-en
Behavioral task
behavioral23
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240903-en
Behavioral task
behavioral24
Sample
$PLUGINSDIR/nsProcess.dll
Resource
win7-20241010-en
Behavioral task
behavioral25
Sample
secrehosted.exe
Resource
win7-20240903-en
General
-
Target
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe
-
Size
5.7MB
-
MD5
ef8e29925a165755db235f31092eb5e6
-
SHA1
3bae3a4c18c7d8baf0fca9b0a5e58b7785f33123
-
SHA256
4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663
-
SHA512
5ae5e1fa3bc54431dad5cfb16ea14ac7ac203265197af9ad181d0362dee248cd2e9de18da71a5712e97522c2eb3fa5c24629ebd418b2aadcc32c694237bc2200
-
SSDEEP
98304:yVWEpMFhfhIp8WIs6d0xCNj3DeoWhoWEEN2F5qh27OkgnQxdT6/dsjNUoWUP9O:zB1IdIs6dNN2oIoWEn/qhNk0H/dsaI9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 596 sihost.exe -
Loads dropped DLL 1 IoCs
pid Process 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs 2 IoCs
flow ioc 3 iplogger.org 5 iplogger.org -
Suspicious use of NtSetInformationThreadHideFromDebugger 17 IoCs
pid Process 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe 596 sihost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language sihost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language schtasks.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2932 schtasks.exe 2220 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 596 sihost.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 596 sihost.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 1032 wrote to memory of 2932 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 31 PID 1032 wrote to memory of 2932 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 31 PID 1032 wrote to memory of 2932 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 31 PID 1032 wrote to memory of 2932 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 31 PID 1032 wrote to memory of 596 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 34 PID 1032 wrote to memory of 596 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 34 PID 1032 wrote to memory of 596 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 34 PID 1032 wrote to memory of 596 1032 4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe 34 PID 596 wrote to memory of 2220 596 sihost.exe 35 PID 596 wrote to memory of 2220 596 sihost.exe 35 PID 596 wrote to memory of 2220 596 sihost.exe 35 PID 596 wrote to memory of 2220 596 sihost.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe"C:\Users\Admin\AppData\Local\Temp\4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe"1⤵
- Loads dropped DLL
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1032 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 5 /TN "Shell Infrastructure Host" /TR "C:\Users\Admin\AppData\Roaming\WinRAR\sihost.exe" /F2⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2932
-
-
C:\Users\Admin\AppData\Roaming\WinRAR\sihost.exet C:\Users\Admin\AppData\Local\Temp\4f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /MO 5 /TN "Shell Infrastructure Host" /TR "C:\Users\Admin\AppData\Roaming\WinRAR\sihost.exe" /F3⤵
- System Location Discovery: System Language Discovery
- Scheduled Task/Job: Scheduled Task
PID:2220
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5.7MB
MD5ef8e29925a165755db235f31092eb5e6
SHA13bae3a4c18c7d8baf0fca9b0a5e58b7785f33123
SHA2564f7713dcf8ad6717ea6eb432774a29317649a512445221dc0a29ed79e48b7663
SHA5125ae5e1fa3bc54431dad5cfb16ea14ac7ac203265197af9ad181d0362dee248cd2e9de18da71a5712e97522c2eb3fa5c24629ebd418b2aadcc32c694237bc2200