Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows11-21h2_x64 -
resource
win11-20250217-en -
resource tags
arch:x64arch:x86image:win11-20250217-enlocale:en-usos:windows11-21h2-x64system -
submitted
09/03/2025, 17:12
Behavioral task
behavioral1
Sample
S7fiTRL.exe
Resource
win11-20250217-en
General
-
Target
S7fiTRL.exe
-
Size
56KB
-
MD5
c8723bca6d83cbad8cbc75ae323d749d
-
SHA1
e40e8e84186286495aaff872e74afd6bd9c0aafd
-
SHA256
6688a94f9872a333a01e925207a7a356dfb8e7083926cd5218a572ec67c2d458
-
SHA512
28e902f13fbd8cca7cab58df38306d85e62c98eced62e96bffce205a3bdf1f0f411830ed77373905ba6ae040536dc6da188fbdaec1db6f63e97e50e50c5a9700
-
SSDEEP
1536:DMOiQ4BKCxOhU8WdJmQ/KawN9Qe6cr9bAJZXjof4vLa0:DxizBKCyU8WdJmQ/KawN9/r9bAJZXjiY
Malware Config
Extracted
litehttp
v1.0.10
http://185.208.156.162/page.php
-
key
v1d6kd29g85cm8jp4pv8tvflvg303gbl
Signatures
-
Litehttp family
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1216 powershell.exe -
Drops startup file 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Anubis.exe S7fiTRL.exe File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Anubis.lnk S7fiTRL.exe -
Event Triggered Execution: Component Object Model Hijacking 1 TTPs
Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000\Software\Microsoft\Windows\CurrentVersion\Run\Anubis = "\"C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\S3TESiyq\\Anubis.exe\"" S7fiTRL.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\CLSID\{67158E92-FD41-404C-A750-E36E7F8316E3}\InProcServer32 S7fiTRL.exe Key created \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\CLSID S7fiTRL.exe Key created \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\CLSID\{67158E92-FD41-404C-A750-E36E7F8316E3} S7fiTRL.exe Set value (str) \REGISTRY\USER\S-1-5-21-3835819470-2031661444-2626789713-1000_Classes\CLSID\{67158E92-FD41-404C-A750-E36E7F8316E3}\InProcServer32\ = "C:\\Users\\Admin\\AppData\\Roaming\\Local\\Caches\\S3TESiyq\\Anubis.exe" S7fiTRL.exe -
Suspicious behavior: AddClipboardFormatListener 1 IoCs
pid Process 2660 S7fiTRL.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 2660 S7fiTRL.exe 2660 S7fiTRL.exe 2660 S7fiTRL.exe 2660 S7fiTRL.exe 1216 powershell.exe 1216 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2660 S7fiTRL.exe Token: SeDebugPrivilege 1216 powershell.exe -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 2660 wrote to memory of 1216 2660 S7fiTRL.exe 78 PID 2660 wrote to memory of 1216 2660 S7fiTRL.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\S7fiTRL.exe"C:\Users\Admin\AppData\Local\Temp\S7fiTRL.exe"1⤵
- Drops startup file
- Adds Run key to start application
- Modifies registry class
- Suspicious behavior: AddClipboardFormatListener
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell.exe" -NoProfile -ExecutionPolicy Bypass -Command "Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Local\Caches\S3TESiyq\Anubis.exe""2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1216
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Event Triggered Execution
1Component Object Model Hijacking
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
56KB
MD5c8723bca6d83cbad8cbc75ae323d749d
SHA1e40e8e84186286495aaff872e74afd6bd9c0aafd
SHA2566688a94f9872a333a01e925207a7a356dfb8e7083926cd5218a572ec67c2d458
SHA51228e902f13fbd8cca7cab58df38306d85e62c98eced62e96bffce205a3bdf1f0f411830ed77373905ba6ae040536dc6da188fbdaec1db6f63e97e50e50c5a9700