Overview
overview
10Static
static
3svchost.bin.exe
windows7_x64
10svchost.bin.exe
windows7_x64
10svchost.bin.exe
windows7_x64
10svchost.bin.exe
windows7_x64
10svchost.bin.exe
windows11_x64
10svchost.bin.exe
windows10_x64
9svchost.bin.exe
windows10_x64
svchost.bin.exe
windows10_x64
10svchost.bin.exe
windows10_x64
10svchost.bin.exe
windows10_x64
10Analysis
-
max time kernel
359s -
max time network
1275s -
platform
windows11_x64 -
resource
win11 -
submitted
04-09-2021 07:35
Static task
static1
Behavioral task
behavioral1
Sample
svchost.bin.exe
Resource
win7-jp
Behavioral task
behavioral2
Sample
svchost.bin.exe
Resource
win7-fr
Behavioral task
behavioral3
Sample
svchost.bin.exe
Resource
win7-en
Behavioral task
behavioral4
Sample
svchost.bin.exe
Resource
win7-de
Behavioral task
behavioral5
Sample
svchost.bin.exe
Resource
win11
Behavioral task
behavioral6
Sample
svchost.bin.exe
Resource
win10-en
Behavioral task
behavioral7
Sample
svchost.bin.exe
Resource
win10-jp
Behavioral task
behavioral8
Sample
svchost.bin.exe
Resource
win10-fr
Behavioral task
behavioral9
Sample
svchost.bin.exe
Resource
win10-en
Behavioral task
behavioral10
Sample
svchost.bin.exe
Resource
win10-de
General
-
Target
svchost.bin.exe
-
Size
6.6MB
-
MD5
2787bb2d1ab223f8ac2692f3a8fd85fc
-
SHA1
dc34ee4e46ddea333cdc90e4aad7589cb8ee1ea0
-
SHA256
952e3e059251cd41e3c67006c5aa4b75fe3e6b0f18d96554b2d60d4ccfb78cb4
-
SHA512
d79bd7599ccb09fa72b939a506d04e28cb958e59c3987ab4d375e76337d5b1e33369d59397338aaeaf938c14ec9d93b20501d5224d151631c69c874d0657e9f3
Malware Config
Signatures
-
Grants admin privileges 1 TTPs
Uses net.exe to modify the user's privileges.
-
Loads dropped DLL 29 IoCs
pid Process 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe 3364 svchost.bin.exe -
Gathers network information 2 TTPs 3 IoCs
Uses commandline utility to view network configuration.
pid Process 4188 netstat.exe 2928 ipconfig.exe 4720 ipconfig.exe -
Modifies data under HKEY_USERS 58 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationBlurBalance = "1" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History\AutoColor = "0" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColor = "3288365268" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglowBalance = "10" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationGlassAttribute = "1" LogonUI.exe Key created \REGISTRY\USER\S-1-5-19\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\Connections svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache\7\52C64B7E svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CRLs sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\AccentColor = "4292114432" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\TrustedPeople\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\trust sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Themes\History LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\TrustedPeople sihclient.exe Key created \REGISTRY\USER\S-1-5-19\Software\Classes\Local Settings\MuiCache svchost.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationColorBalance = "89" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\Disallowed\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Root sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\StartColorMenu = "4290799360" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\EnableWindowColorization = "73" LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\CA\CRLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\CA\Certificates sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\Disallowed sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Policies\Microsoft\SystemCertificates\trust\CTLs sihclient.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent LogonUI.exe Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentPalette = 99ebff004cc2ff000091f8000078d4000067c000003e9200001a6800f7630c00 LogonUI.exe Key created \REGISTRY\USER\.DEFAULT\Software\Microsoft\SystemCertificates\SmartCardRoot\CTLs sihclient.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\Accent\AccentColorMenu = "4292114432" LogonUI.exe Set value (int) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\DWM\ColorizationAfterglow = "3288365268" LogonUI.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 8 powershell.exe 8 powershell.exe 8 powershell.exe 8 powershell.exe 8 powershell.exe 8 powershell.exe 8 powershell.exe 8 powershell.exe 3364 svchost.bin.exe 3364 svchost.bin.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 3532 WMIC.exe Token: SeSecurityPrivilege 3532 WMIC.exe Token: SeTakeOwnershipPrivilege 3532 WMIC.exe Token: SeLoadDriverPrivilege 3532 WMIC.exe Token: SeSystemProfilePrivilege 3532 WMIC.exe Token: SeSystemtimePrivilege 3532 WMIC.exe Token: SeProfSingleProcessPrivilege 3532 WMIC.exe Token: SeIncBasePriorityPrivilege 3532 WMIC.exe Token: SeCreatePagefilePrivilege 3532 WMIC.exe Token: SeBackupPrivilege 3532 WMIC.exe Token: SeRestorePrivilege 3532 WMIC.exe Token: SeShutdownPrivilege 3532 WMIC.exe Token: SeDebugPrivilege 3532 WMIC.exe Token: SeSystemEnvironmentPrivilege 3532 WMIC.exe Token: SeRemoteShutdownPrivilege 3532 WMIC.exe Token: SeUndockPrivilege 3532 WMIC.exe Token: SeManageVolumePrivilege 3532 WMIC.exe Token: 33 3532 WMIC.exe Token: 34 3532 WMIC.exe Token: 35 3532 WMIC.exe Token: 36 3532 WMIC.exe Token: SeIncreaseQuotaPrivilege 3532 WMIC.exe Token: SeSecurityPrivilege 3532 WMIC.exe Token: SeTakeOwnershipPrivilege 3532 WMIC.exe Token: SeLoadDriverPrivilege 3532 WMIC.exe Token: SeSystemProfilePrivilege 3532 WMIC.exe Token: SeSystemtimePrivilege 3532 WMIC.exe Token: SeProfSingleProcessPrivilege 3532 WMIC.exe Token: SeIncBasePriorityPrivilege 3532 WMIC.exe Token: SeCreatePagefilePrivilege 3532 WMIC.exe Token: SeBackupPrivilege 3532 WMIC.exe Token: SeRestorePrivilege 3532 WMIC.exe Token: SeShutdownPrivilege 3532 WMIC.exe Token: SeDebugPrivilege 3532 WMIC.exe Token: SeSystemEnvironmentPrivilege 3532 WMIC.exe Token: SeRemoteShutdownPrivilege 3532 WMIC.exe Token: SeUndockPrivilege 3532 WMIC.exe Token: SeManageVolumePrivilege 3532 WMIC.exe Token: 33 3532 WMIC.exe Token: 34 3532 WMIC.exe Token: 35 3532 WMIC.exe Token: 36 3532 WMIC.exe Token: SeDebugPrivilege 8 powershell.exe Token: SeDebugPrivilege 4188 netstat.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2272 LogonUI.exe -
Suspicious use of WriteProcessMemory 41 IoCs
description pid Process procid_target PID 2412 wrote to memory of 3364 2412 svchost.bin.exe 78 PID 2412 wrote to memory of 3364 2412 svchost.bin.exe 78 PID 2412 wrote to memory of 3364 2412 svchost.bin.exe 78 PID 3364 wrote to memory of 4388 3364 svchost.bin.exe 82 PID 3364 wrote to memory of 4388 3364 svchost.bin.exe 82 PID 3364 wrote to memory of 4388 3364 svchost.bin.exe 82 PID 4388 wrote to memory of 3532 4388 cmd.exe 83 PID 4388 wrote to memory of 3532 4388 cmd.exe 83 PID 4388 wrote to memory of 3532 4388 cmd.exe 83 PID 3364 wrote to memory of 4528 3364 svchost.bin.exe 84 PID 3364 wrote to memory of 4528 3364 svchost.bin.exe 84 PID 3364 wrote to memory of 4528 3364 svchost.bin.exe 84 PID 4528 wrote to memory of 4540 4528 cmd.exe 85 PID 4528 wrote to memory of 4540 4528 cmd.exe 85 PID 4528 wrote to memory of 4540 4528 cmd.exe 85 PID 4540 wrote to memory of 5044 4540 net.exe 86 PID 4540 wrote to memory of 5044 4540 net.exe 86 PID 4540 wrote to memory of 5044 4540 net.exe 86 PID 3364 wrote to memory of 908 3364 svchost.bin.exe 87 PID 3364 wrote to memory of 908 3364 svchost.bin.exe 87 PID 3364 wrote to memory of 908 3364 svchost.bin.exe 87 PID 908 wrote to memory of 4944 908 cmd.exe 88 PID 908 wrote to memory of 4944 908 cmd.exe 88 PID 908 wrote to memory of 4944 908 cmd.exe 88 PID 4944 wrote to memory of 968 4944 net.exe 89 PID 4944 wrote to memory of 968 4944 net.exe 89 PID 4944 wrote to memory of 968 4944 net.exe 89 PID 3364 wrote to memory of 8 3364 svchost.bin.exe 90 PID 3364 wrote to memory of 8 3364 svchost.bin.exe 90 PID 3364 wrote to memory of 4648 3364 svchost.bin.exe 91 PID 3364 wrote to memory of 4648 3364 svchost.bin.exe 91 PID 3364 wrote to memory of 4648 3364 svchost.bin.exe 91 PID 4648 wrote to memory of 2928 4648 cmd.exe 92 PID 4648 wrote to memory of 2928 4648 cmd.exe 92 PID 4648 wrote to memory of 2928 4648 cmd.exe 92 PID 3364 wrote to memory of 4720 3364 svchost.bin.exe 93 PID 3364 wrote to memory of 4720 3364 svchost.bin.exe 93 PID 3364 wrote to memory of 4720 3364 svchost.bin.exe 93 PID 3364 wrote to memory of 4188 3364 svchost.bin.exe 94 PID 3364 wrote to memory of 4188 3364 svchost.bin.exe 94 PID 3364 wrote to memory of 4188 3364 svchost.bin.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"C:\Users\Admin\AppData\Local\Temp\svchost.bin.exe"2⤵
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3364 -
C:\Windows\SysWOW64\cmd.execmd /c wmic ntdomain get domainname3⤵
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\Wbem\WMIC.exewmic ntdomain get domainname4⤵
- Suspicious use of AdjustPrivilegeToken
PID:3532
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net localgroup administrators3⤵
- Suspicious use of WriteProcessMemory
PID:4528 -
C:\Windows\SysWOW64\net.exenet localgroup administrators4⤵
- Suspicious use of WriteProcessMemory
PID:4540 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 localgroup administrators5⤵PID:5044
-
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c net group "domain admins" /domain3⤵
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Windows\SysWOW64\net.exenet group "domain admins" /domain4⤵
- Suspicious use of WriteProcessMemory
PID:4944 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 group "domain admins" /domain5⤵PID:968
-
-
-
-
C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\SysNative\WindowsPowerShell\v1.0\powershell.exe -exec bypass "import-module C:\Users\Admin\AppData\Local\Temp\m2.ps1"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:8
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c ipconfig /all3⤵
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all4⤵
- Gathers network information
PID:2928
-
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:4720
-
-
C:\Windows\SysWOW64\netstat.exenetstat -na3⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:4188
-
-
-
C:\Windows\System32\sihclient.exeC:\Windows\System32\sihclient.exe /cv bIwyp2o330q1fggh9KFnew.0.21⤵
- Modifies data under HKEY_USERS
PID:3732
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s BITS1⤵
- Modifies data under HKEY_USERS
PID:3744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation -p -s SSDPSRV1⤵PID:5036
-
C:\Windows\system32\LogonUI.exe"LogonUI.exe" /flags:0x4 /state0:0xa3a68055 /state1:0x41c64e6d1⤵
- Modifies data under HKEY_USERS
- Suspicious use of SetWindowsHookEx
PID:2272