Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 19:07
Static task
static1
Behavioral task
behavioral1
Sample
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe
Resource
win10v2004-20220812-en
General
-
Target
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe
-
Size
304KB
-
MD5
94d88c1a45a4c41bf3beda6cb5613f5d
-
SHA1
6c568b5bd6f125e5e00ec87a25969ef312868225
-
SHA256
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f
-
SHA512
22749e97ef998afe45f97837f8546541516f0eae40a3f1cf0d5630f69ea6211697321f58e9b66bd8091bc9a4c955c6a773ec402a71f6dc8c60caa937b9044486
-
SSDEEP
3072:buMIDuFVj6F2OBEayw37L+VbdvsT9hi2uuQ6jKy49WGku0tizAWphTHtlCT:KXFEaywLyVZvSS91J7Jtg
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchosvt.exesvchosvt.exepid process 2960 svchosvt.exe 4180 svchosvt.exe -
Creates a Windows Service
-
Drops file in Windows directory 2 IoCs
Processes:
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exedescription ioc process File created C:\Windows\svchosvt.exe f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe File opened for modification C:\Windows\svchosvt.exe f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exesvchosvt.exesvchosvt.exepid process 2352 f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe 2352 f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe 2352 f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe 2352 f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe 2960 svchosvt.exe 2960 svchosvt.exe 2960 svchosvt.exe 2960 svchosvt.exe 4180 svchosvt.exe 4180 svchosvt.exe 4180 svchosvt.exe 4180 svchosvt.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exepid process 2352 f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exesvchosvt.exesvchosvt.exepid process 2352 f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe 2960 svchosvt.exe 4180 svchosvt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
svchosvt.exedescription pid process target process PID 2960 wrote to memory of 4180 2960 svchosvt.exe svchosvt.exe PID 2960 wrote to memory of 4180 2960 svchosvt.exe svchosvt.exe PID 2960 wrote to memory of 4180 2960 svchosvt.exe svchosvt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe"C:\Users\Admin\AppData\Local\Temp\f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2352
-
C:\Windows\svchosvt.exeC:\Windows\svchosvt.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\svchosvt.exeC:\Windows\svchosvt.exe Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4180
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
304KB
MD594d88c1a45a4c41bf3beda6cb5613f5d
SHA16c568b5bd6f125e5e00ec87a25969ef312868225
SHA256f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f
SHA51222749e97ef998afe45f97837f8546541516f0eae40a3f1cf0d5630f69ea6211697321f58e9b66bd8091bc9a4c955c6a773ec402a71f6dc8c60caa937b9044486
-
Filesize
304KB
MD594d88c1a45a4c41bf3beda6cb5613f5d
SHA16c568b5bd6f125e5e00ec87a25969ef312868225
SHA256f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f
SHA51222749e97ef998afe45f97837f8546541516f0eae40a3f1cf0d5630f69ea6211697321f58e9b66bd8091bc9a4c955c6a773ec402a71f6dc8c60caa937b9044486
-
Filesize
304KB
MD594d88c1a45a4c41bf3beda6cb5613f5d
SHA16c568b5bd6f125e5e00ec87a25969ef312868225
SHA256f7fa3a599d421ff013309f5358537b283dbaf1e1bddc524b1203d92c095afd3f
SHA51222749e97ef998afe45f97837f8546541516f0eae40a3f1cf0d5630f69ea6211697321f58e9b66bd8091bc9a4c955c6a773ec402a71f6dc8c60caa937b9044486