Analysis
-
max time kernel
83s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20220718-en -
resource tags
arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system -
submitted
19-07-2022 14:44
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20220718-en
General
-
Target
svchost.exe
-
Size
479KB
-
MD5
4c6b01344809054252095695fe24aa5f
-
SHA1
d1571b19723ebb0def5a71b7d977ef4c5bdb66ab
-
SHA256
b20bdd03ad605edafccbed9cbf281d1fd370116dd07e335fc2f428e9efb2863b
-
SHA512
a26600e8233e90034a3a731246bdc634bc30478ea995c37317ef2e8139200f09446c4b78b500ffec5d7a84045790d0e80d20e4ba58cf28f0e4358f80e1db3af0
Malware Config
Extracted
asyncrat
0.5.7B
Default
secureyourdataarea1.duckdns.org:56390
AsyncMutex_6SI8OkPnk
-
delay
3
-
install
false
-
install_file
svchost.exe
-
install_folder
%AppData%
Signatures
-
Modifies system executable filetype association 2 TTPs 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" svchost.exe -
Neshta
Malware from the neshta family is designed to infect itself into other files to spread itself and cause damage.
-
Async RAT payload 6 IoCs
Processes:
resource yara_rule behavioral1/memory/2040-69-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-75-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-73-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-70-0x000000000040C74E-mapping.dmp asyncrat behavioral1/memory/2040-68-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat behavioral1/memory/2040-67-0x0000000000400000-0x0000000000412000-memory.dmp asyncrat -
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 992 svchost.exe 2040 svchost.exe -
Loads dropped DLL 3 IoCs
Processes:
svchost.exesvchost.exepid process 964 svchost.exe 964 svchost.exe 992 svchost.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
svchost.exedescription pid process target process PID 992 set thread context of 2040 992 svchost.exe svchost.exe -
Drops file in Program Files directory 64 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\PROGRA~2\COMMON~1\ADOBEA~1\Versions\1.0\ADOBEA~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\MSInfo\msinfo32.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\Oarpmany.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\ODeploy.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\OFFICE~1\Setup.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~2.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOSYNC.EXE svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\AcroRd32.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\VPREVIEW.EXE svchost.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmprph.exe svchost.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmpshare.exe svchost.exe File opened for modification C:\PROGRA~2\WINDOW~2\ACCESS~1\wordpad.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\PPTICO.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ACCICONS.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\INFOPATH.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\OIS.EXE svchost.exe File opened for modification C:\PROGRA~2\WI54FB~1\WMPDMC.exe svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\FLTLDR.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\GROOVEMN.EXE svchost.exe File opened for modification C:\PROGRA~3\PACKAG~1\{EF6B0~1\VCREDI~1.EXE svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~4.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\TextConv\WksConv\Wkconv.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\NAMECO~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\ink\mip.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\WINWORD.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\XLICONS.EXE svchost.exe File opened for modification C:\PROGRA~2\WI54FB~1\setup_wm.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\SETUPF~1\{AC76B~1\Setup.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Resource\Icons\SC_REA~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\EQUATION\EQNEDT32.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\LICLUA.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORE.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\ONENOTEM.EXE svchost.exe File opened for modification C:\PROGRA~2\WI54FB~1\wmlaunch.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\LOGTRA~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\VSTO\10.0\VSTOIN~1.EXE svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GO664E~1.EXE svchost.exe File opened for modification C:\PROGRA~2\Google\Update\DISABL~1.EXE svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\iexplore.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOHTMED.EXE svchost.exe File opened for modification C:\PROGRA~2\WINDOW~1\WinMail.exe svchost.exe File opened for modification C:\PROGRA~3\PACKAG~1\{33D1F~1\VCREDI~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\DW\DW20.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBEU~1.EXE svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOBD5D~1.EXE svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ielowutil.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSOUC.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSTORDB.EXE svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\ACROBR~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\Adobe\Updater6\ADOBE_~1.EXE svchost.exe File opened for modification C:\PROGRA~2\COMMON~1\MICROS~1\OFFICE14\MSOXMLED.EXE svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOF5E2~1.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\IECONT~1.EXE svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\MSQRY32.EXE svchost.exe File opened for modification C:\PROGRA~2\WINDOW~1\wabmig.exe svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\Eula.exe svchost.exe File opened for modification C:\PROGRA~2\Google\Update\1336~1.71\GOOGLE~3.EXE svchost.exe File opened for modification C:\PROGRA~2\WINDOW~1\wab.exe svchost.exe File opened for modification C:\PROGRA~2\WI4223~1\sidebar.exe svchost.exe File opened for modification C:\PROGRA~3\PACKAG~1\{61087~1\VCREDI~1.EXE svchost.exe File opened for modification C:\PROGRA~2\Adobe\READER~1.0\Reader\A3DUTI~1.EXE svchost.exe File opened for modification C:\PROGRA~2\INTERN~1\ieinstal.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\misc.exe svchost.exe File opened for modification C:\PROGRA~2\MICROS~1\Office14\POWERPNT.EXE svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Windows\svchost.com svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies registry class 1 IoCs
Processes:
svchost.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\exefile\shell\open\command\ = "C:\\Windows\\svchost.com \"%1\" %*" svchost.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
svchost.exesvchost.exedescription pid process Token: SeDebugPrivilege 992 svchost.exe Token: SeDebugPrivilege 2040 svchost.exe -
Suspicious use of WriteProcessMemory 13 IoCs
Processes:
svchost.exesvchost.exedescription pid process target process PID 964 wrote to memory of 992 964 svchost.exe svchost.exe PID 964 wrote to memory of 992 964 svchost.exe svchost.exe PID 964 wrote to memory of 992 964 svchost.exe svchost.exe PID 964 wrote to memory of 992 964 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe PID 992 wrote to memory of 2040 992 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost.exe"C:\Users\Admin\AppData\Local\Temp\svchost.exe"1⤵
- Modifies system executable filetype association
- Loads dropped DLL
- Drops file in Program Files directory
- Drops file in Windows directory
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe"C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Users\Admin\AppData\Local\Temp\3582-490\svchost.exe03⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:2040
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715
-
Filesize
252KB
MD59e2b9928c89a9d0da1d3e8f4bd96afa7
SHA1ec66cda99f44b62470c6930e5afda061579cde35
SHA2568899b4ed3446b7d55b54defbc1acb7c5392a4b3bc8ec2cdc7c31171708965043
SHA5122ca5ad1d0e12a8049de885b90b7f56fe77c868e0d6dae4ec4b6f3bc0bf7b2e73295cc9b1328c2b45357ffb0d7804622ab3f91a56140b098e93b691032d508156
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715
-
Filesize
438KB
MD561f89c90f92b2579d100f2af29f8375b
SHA194b645443699532b764963a6340dc2001de78146
SHA256531a2ee7e49f863969f2e353cfc0d62117d4857c9cf3784fa387c72a9911b757
SHA512fadb57106257333e6e34de9f7a47ca99b1aa628ddb4d973b088a66e3d7d7dda339a680204671bedf96aab68adaeb3797f82c06743dd550eb71d3f850e4214715