Analysis
-
max time kernel
153s -
max time network
110s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
07-11-2022 00:53
Static task
static1
Behavioral task
behavioral1
Sample
d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe
Resource
win10v2004-20220812-en
General
-
Target
d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe
-
Size
208KB
-
MD5
0dfcd6d9a55f26fc1c22a5a9d5e774e0
-
SHA1
cb9ad745a545c8f36daa80cd5b28b0119648ea82
-
SHA256
d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59
-
SHA512
c1dff8be6c90ca8fe280b5af242a9510ce72bf38d03cca2e95f6fbf90fba55b3d70e42a1718a29e779cdc2bb0d34ae53ab48c26044472ef768ec20da76c09af5
-
SSDEEP
1536:Vfuxw10lxJM5y8w5OZRVmgyDl+cWaxJcveQZNTRSb3EBAR1AlQPsxjheYhpXN5yh:f0OtF2Qo7VsJgisxlYegEX0ZZbW
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 308 svhust.exe 900 svhust.exe 1608 svhust.exe -
resource yara_rule behavioral1/memory/840-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/840-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/840-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/840-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/840-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/840-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1608-94-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1608-97-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1608-99-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/840-105-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/900-107-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1608-108-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1608-110-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1608-111-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1608-113-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/900-114-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 4 IoCs
pid Process 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhust = "C:\\Users\\Admin\\AppData\\Roaming\\svhust\\svhust.exe" reg.exe Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run svhust.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VideoDriver = "C:\\Windows\\system32\\winldr.exe" svhust.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\System32\winldr.exe svhust.exe File opened for modification C:\Windows\SysWOW64\winldr.exe svhust.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 1668 set thread context of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 308 set thread context of 900 308 svhust.exe 33 PID 308 set thread context of 1608 308 svhust.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe Token: SeDebugPrivilege 900 svhust.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 1608 svhust.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 308 svhust.exe 900 svhust.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 1668 wrote to memory of 840 1668 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 28 PID 840 wrote to memory of 956 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 29 PID 840 wrote to memory of 956 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 29 PID 840 wrote to memory of 956 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 29 PID 840 wrote to memory of 956 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 29 PID 956 wrote to memory of 1776 956 cmd.exe 31 PID 956 wrote to memory of 1776 956 cmd.exe 31 PID 956 wrote to memory of 1776 956 cmd.exe 31 PID 956 wrote to memory of 1776 956 cmd.exe 31 PID 840 wrote to memory of 308 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 32 PID 840 wrote to memory of 308 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 32 PID 840 wrote to memory of 308 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 32 PID 840 wrote to memory of 308 840 d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe 32 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 900 308 svhust.exe 33 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34 PID 308 wrote to memory of 1608 308 svhust.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe"C:\Users\Admin\AppData\Local\Temp\d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe"C:\Users\Admin\AppData\Local\Temp\d7dfeb3a01e365e91a021099cfccb964b0cd370fcc67067d9cd6e748abae8b59.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:840 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\SGHDB.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:956 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f4⤵
- Adds Run key to start application
PID:1776
-
-
-
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:308 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:900
-
-
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of FindShellTrayWindow
PID:1608
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5e83a2e0b3c1e03dfb96ffd9924117a45
SHA127a3e4ba115ba1bad0bf094f5b97e768d1ece33e
SHA256655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13
SHA5125f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2
-
Filesize
208KB
MD50eef53b95d9b6aa8f94c937c5708c3e1
SHA1b765f24afbb7df5f5cac4aefe153d028ecab2123
SHA25693be0491565c5a23f7454bc94826aab6a7470b0ea25699478284cefebf56d1bf
SHA51278f0d7f896662a31f694137eec8db01e93f737a2268d1aa9b06a1f6e2f60804f54fbcbc89ed24c1bf7e4a0a5c0de6a51aadf3dc9d4f4e5ee9de96399ba356fe2