Analysis
-
max time kernel
150s -
max time network
136s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:31
Static task
static1
Behavioral task
behavioral1
Sample
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe
Resource
win10v2004-20220901-en
General
-
Target
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe
-
Size
152KB
-
MD5
06e0df1c492f80eb535c495230c45550
-
SHA1
c1629ca1c5880b9359708a89db03538b45dd4e29
-
SHA256
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
-
SHA512
a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
SSDEEP
1536:c1DMz1DQvXLq6t7awFONecenlLnQHIG5R9c73P600t:9eGw9A0rC00t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 5 IoCs
Processes:
resource yara_rule behavioral1/memory/1544-108-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1544-113-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1780-167-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1780-171-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1636-226-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 13 IoCs
Processes:
svhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exepid process 1380 svhust.exe 1376 svhust.exe 1544 svhust.exe 1468 AdobeART.exe 1244 AdobeART.exe 1352 svhust.exe 1112 svhust.exe 1780 svhust.exe 1928 AdobeART.exe 664 AdobeART.exe 1720 svhust.exe 880 svhust.exe 1636 svhust.exe -
Processes:
resource yara_rule behavioral1/memory/1404-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1404-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1404-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1404-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1404-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1404-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1544-94-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1544-97-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1544-99-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1404-107-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1544-106-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1544-108-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1544-113-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1244-131-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1376-132-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1780-165-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1244-166-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1780-167-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1780-171-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/664-189-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/664-224-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/880-225-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1636-226-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1376-228-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1112-229-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/880-230-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 13 IoCs
Processes:
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exepid process 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe 1544 svhust.exe 1544 svhust.exe 1244 AdobeART.exe 1244 AdobeART.exe 1244 AdobeART.exe 1780 svhust.exe 664 AdobeART.exe 664 AdobeART.exe 664 AdobeART.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
reg.exesvhust.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhust = "C:\\Users\\Admin\\AppData\\Roaming\\svhust\\svhust.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" svhust.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exesvhust.exedescription pid process target process PID 1444 set thread context of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1380 set thread context of 1376 1380 svhust.exe svhust.exe PID 1380 set thread context of 1544 1380 svhust.exe svhust.exe PID 1468 set thread context of 1244 1468 AdobeART.exe AdobeART.exe PID 1352 set thread context of 1112 1352 svhust.exe svhust.exe PID 1352 set thread context of 1780 1352 svhust.exe svhust.exe PID 1928 set thread context of 664 1928 AdobeART.exe AdobeART.exe PID 1720 set thread context of 880 1720 svhust.exe svhust.exe PID 1720 set thread context of 1636 1720 svhust.exe svhust.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svhust.exesvhust.exesvhust.exedescription pid process Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 880 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe Token: SeDebugPrivilege 1376 svhust.exe Token: SeDebugPrivilege 1112 svhust.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exea71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exepid process 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe 1380 svhust.exe 1376 svhust.exe 1468 AdobeART.exe 1244 AdobeART.exe 1352 svhust.exe 1112 svhust.exe 1928 AdobeART.exe 664 AdobeART.exe 1720 svhust.exe 880 svhust.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exea71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.execmd.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exedescription pid process target process PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1444 wrote to memory of 1404 1444 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe PID 1404 wrote to memory of 1940 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe cmd.exe PID 1404 wrote to memory of 1940 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe cmd.exe PID 1404 wrote to memory of 1940 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe cmd.exe PID 1404 wrote to memory of 1940 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe cmd.exe PID 1940 wrote to memory of 1720 1940 cmd.exe reg.exe PID 1940 wrote to memory of 1720 1940 cmd.exe reg.exe PID 1940 wrote to memory of 1720 1940 cmd.exe reg.exe PID 1940 wrote to memory of 1720 1940 cmd.exe reg.exe PID 1404 wrote to memory of 1380 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe svhust.exe PID 1404 wrote to memory of 1380 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe svhust.exe PID 1404 wrote to memory of 1380 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe svhust.exe PID 1404 wrote to memory of 1380 1404 a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1376 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1380 wrote to memory of 1544 1380 svhust.exe svhust.exe PID 1544 wrote to memory of 1468 1544 svhust.exe AdobeART.exe PID 1544 wrote to memory of 1468 1544 svhust.exe AdobeART.exe PID 1544 wrote to memory of 1468 1544 svhust.exe AdobeART.exe PID 1544 wrote to memory of 1468 1544 svhust.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1468 wrote to memory of 1244 1468 AdobeART.exe AdobeART.exe PID 1244 wrote to memory of 1352 1244 AdobeART.exe svhust.exe PID 1244 wrote to memory of 1352 1244 AdobeART.exe svhust.exe PID 1244 wrote to memory of 1352 1244 AdobeART.exe svhust.exe PID 1244 wrote to memory of 1352 1244 AdobeART.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1112 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1780 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1780 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1780 1352 svhust.exe svhust.exe PID 1352 wrote to memory of 1780 1352 svhust.exe svhust.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe"C:\Users\Admin\AppData\Local\Temp\a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe"C:\Users\Admin\AppData\Local\Temp\a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1404 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\QHFQO.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f4⤵
- Adds Run key to start application
PID:1720 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1380 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1544 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1468 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1352 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1780 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:664 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:880 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1636
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5e83a2e0b3c1e03dfb96ffd9924117a45
SHA127a3e4ba115ba1bad0bf094f5b97e768d1ece33e
SHA256655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13
SHA5125f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1
-
Filesize
152KB
MD506e0df1c492f80eb535c495230c45550
SHA1c1629ca1c5880b9359708a89db03538b45dd4e29
SHA256a71818ba4cd451b4c84579fb77141428ddc37d6b6a7a5d64d3b1d8b4c74c95f7
SHA512a7d8af3d3b2d97d49756c7a1d2067dfa58e4cab87c3bea5b87bcb1187f10a27de1404c6b2862a0229af3395a5f1a8bed790e567360fc8e98a6b680d5a74234b1