Analysis
-
max time kernel
150s -
max time network
155s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:31
Static task
static1
Behavioral task
behavioral1
Sample
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe
Resource
win10v2004-20221111-en
General
-
Target
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe
-
Size
152KB
-
MD5
eb9f28b6b0877b9a39f3f6f0eefef9a0
-
SHA1
ea399d5d13ac71039cdc70d13f9d697ca1acc853
-
SHA256
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917
-
SHA512
cc257f6cd72a0972fc651e8af54be0d924ad8336f613b39233f7267216f3b45c5506559617db166711097ac129fc464460efa7fcfa3e555d2b12b92386b4ed5a
-
SSDEEP
1536:c1DMz1DQvXLq6t7awFONecenlLnQHIG5R9c73P600t:9eGw9A0rC00t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1580-108-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1580-113-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/2028-167-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/2028-171-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1132-227-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 13 IoCs
Processes:
svhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exepid process 676 svhust.exe 1672 svhust.exe 1580 svhust.exe 720 AdobeART.exe 2040 AdobeART.exe 1160 svhust.exe 1584 svhust.exe 2028 svhust.exe 1104 AdobeART.exe 1648 AdobeART.exe 1512 svhust.exe 1528 svhust.exe 1132 svhust.exe -
Processes:
resource yara_rule behavioral1/memory/968-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/968-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/968-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/968-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/968-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/968-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1580-94-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1580-96-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1580-98-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/968-104-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1580-107-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1580-108-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1580-113-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2040-131-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1672-132-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2040-165-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2028-166-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2028-167-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2028-171-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1648-189-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1584-190-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1648-225-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1528-226-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1132-227-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1672-229-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1584-230-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1528-231-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 13 IoCs
Processes:
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exepid process 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe 1580 svhust.exe 1580 svhust.exe 2040 AdobeART.exe 2040 AdobeART.exe 2040 AdobeART.exe 2028 svhust.exe 1648 AdobeART.exe 1648 AdobeART.exe 1648 AdobeART.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
svhust.exereg.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" svhust.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhust = "C:\\Users\\Admin\\AppData\\Roaming\\svhust\\svhust.exe" reg.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exesvhust.exedescription pid process target process PID 1064 set thread context of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 676 set thread context of 1672 676 svhust.exe svhust.exe PID 676 set thread context of 1580 676 svhust.exe svhust.exe PID 720 set thread context of 2040 720 AdobeART.exe AdobeART.exe PID 1160 set thread context of 1584 1160 svhust.exe svhust.exe PID 1160 set thread context of 2028 1160 svhust.exe svhust.exe PID 1104 set thread context of 1648 1104 AdobeART.exe AdobeART.exe PID 1512 set thread context of 1528 1512 svhust.exe svhust.exe PID 1512 set thread context of 1132 1512 svhust.exe svhust.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svhust.exesvhust.exesvhust.exedescription pid process Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe Token: SeDebugPrivilege 1584 svhust.exe Token: SeDebugPrivilege 1528 svhust.exe Token: SeDebugPrivilege 1672 svhust.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exebbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exepid process 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe 676 svhust.exe 1672 svhust.exe 720 AdobeART.exe 2040 AdobeART.exe 1160 svhust.exe 1584 svhust.exe 1104 AdobeART.exe 1648 AdobeART.exe 1512 svhust.exe 1528 svhust.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exebbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.execmd.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exedescription pid process target process PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 1064 wrote to memory of 968 1064 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe PID 968 wrote to memory of 1492 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe cmd.exe PID 968 wrote to memory of 1492 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe cmd.exe PID 968 wrote to memory of 1492 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe cmd.exe PID 968 wrote to memory of 1492 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe cmd.exe PID 1492 wrote to memory of 1652 1492 cmd.exe reg.exe PID 1492 wrote to memory of 1652 1492 cmd.exe reg.exe PID 1492 wrote to memory of 1652 1492 cmd.exe reg.exe PID 1492 wrote to memory of 1652 1492 cmd.exe reg.exe PID 968 wrote to memory of 676 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe svhust.exe PID 968 wrote to memory of 676 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe svhust.exe PID 968 wrote to memory of 676 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe svhust.exe PID 968 wrote to memory of 676 968 bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1672 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 676 wrote to memory of 1580 676 svhust.exe svhust.exe PID 1580 wrote to memory of 720 1580 svhust.exe AdobeART.exe PID 1580 wrote to memory of 720 1580 svhust.exe AdobeART.exe PID 1580 wrote to memory of 720 1580 svhust.exe AdobeART.exe PID 1580 wrote to memory of 720 1580 svhust.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 720 wrote to memory of 2040 720 AdobeART.exe AdobeART.exe PID 2040 wrote to memory of 1160 2040 AdobeART.exe svhust.exe PID 2040 wrote to memory of 1160 2040 AdobeART.exe svhust.exe PID 2040 wrote to memory of 1160 2040 AdobeART.exe svhust.exe PID 2040 wrote to memory of 1160 2040 AdobeART.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 1584 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 2028 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 2028 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 2028 1160 svhust.exe svhust.exe PID 1160 wrote to memory of 2028 1160 svhust.exe svhust.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe"C:\Users\Admin\AppData\Local\Temp\bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe"C:\Users\Admin\AppData\Local\Temp\bbc07c55011ead9aa4a0d4ccca7aa4e651e147dcf0b45f234d83a1bacba1c917.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:968 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\GMDUL.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f4⤵
- Adds Run key to start application
PID:1652 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1580 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:720 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2028 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1132
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5e83a2e0b3c1e03dfb96ffd9924117a45
SHA127a3e4ba115ba1bad0bf094f5b97e768d1ece33e
SHA256655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13
SHA5125f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e
-
Filesize
152KB
MD5dd478cbf23bb5ff6d83c9ccc594c53f8
SHA1ea3526471052eb843c91098a26cac4155cc5a3c4
SHA25663a4d280ba7e45931c663460ce90e2b5c857a358b1c54cc97e9168daf7a4d2af
SHA512b275fa4c3aea6bb0c8af72451168002b6ae446d95a09e3204780fba9dbae1dcb87998296925fea6ae3a7241ed5674e1943f178c48096f5817e0aa9ffbadd1f4e