Analysis
-
max time kernel
203s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:31
Static task
static1
Behavioral task
behavioral1
Sample
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe
Resource
win10v2004-20220812-en
General
-
Target
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe
-
Size
152KB
-
MD5
29d205e05b93fc864fe3a30078dd0620
-
SHA1
a7d124f7983cd91d38b329ee9cca97036a4703e2
-
SHA256
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c
-
SHA512
3b49357902760e8275cf9527174b9daaf87b88d21b38bc9449c9bfda1bb360dd2f6a0f05903c58608ec1251ec6d7b34e82c00f9940ae44c6e9fe61657f871d4c
-
SSDEEP
1536:c1DMz1DQvXLq6t7awFONecenlLnQHIG5R9c73P600t:9eGw9A0rC00t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 6 IoCs
Processes:
resource yara_rule behavioral1/memory/1668-111-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1668-112-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1648-168-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1648-169-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1304-228-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1304-232-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 13 IoCs
Processes:
svhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exepid process 676 svhust.exe 1096 svhust.exe 1668 svhust.exe 1756 AdobeART.exe 1712 AdobeART.exe 2000 svhust.exe 976 svhust.exe 1648 svhust.exe 1584 AdobeART.exe 1496 AdobeART.exe 1348 svhust.exe 1596 svhust.exe 1304 svhust.exe -
Processes:
resource yara_rule behavioral1/memory/1120-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1120-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1120-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1120-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1120-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1120-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1668-95-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1668-98-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1668-100-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1120-105-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1096-107-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1668-108-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1668-110-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1668-111-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1668-112-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1712-134-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1712-165-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1648-167-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1648-168-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1648-169-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/976-170-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1096-172-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1496-193-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1496-226-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1304-228-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1596-229-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/976-231-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1304-232-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1596-233-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 13 IoCs
Processes:
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exepid process 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 1668 svhust.exe 1668 svhust.exe 1712 AdobeART.exe 1712 AdobeART.exe 1712 AdobeART.exe 1648 svhust.exe 1496 AdobeART.exe 1496 AdobeART.exe 1496 AdobeART.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
reg.exesvhust.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhust = "C:\\Users\\Admin\\AppData\\Roaming\\svhust\\svhust.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" svhust.exe -
Suspicious use of SetThreadContext 9 IoCs
Processes:
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exesvhust.exedescription pid process target process PID 316 set thread context of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 676 set thread context of 1096 676 svhust.exe svhust.exe PID 676 set thread context of 1668 676 svhust.exe svhust.exe PID 1756 set thread context of 1712 1756 AdobeART.exe AdobeART.exe PID 2000 set thread context of 976 2000 svhust.exe svhust.exe PID 2000 set thread context of 1648 2000 svhust.exe svhust.exe PID 1584 set thread context of 1496 1584 AdobeART.exe AdobeART.exe PID 1348 set thread context of 1596 1348 svhust.exe svhust.exe PID 1348 set thread context of 1304 1348 svhust.exe svhust.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svhust.exesvhust.exesvhust.exedescription pid process Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe Token: SeDebugPrivilege 1096 svhust.exe Token: SeDebugPrivilege 1596 svhust.exe Token: SeDebugPrivilege 976 svhust.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
Processes:
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exepid process 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 676 svhust.exe 1096 svhust.exe 1756 AdobeART.exe 1712 AdobeART.exe 2000 svhust.exe 976 svhust.exe 1584 AdobeART.exe 1496 AdobeART.exe 1348 svhust.exe 1596 svhust.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.execmd.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exedescription pid process target process PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 316 wrote to memory of 1120 316 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe PID 1120 wrote to memory of 1340 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe cmd.exe PID 1120 wrote to memory of 1340 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe cmd.exe PID 1120 wrote to memory of 1340 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe cmd.exe PID 1120 wrote to memory of 1340 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe cmd.exe PID 1340 wrote to memory of 652 1340 cmd.exe reg.exe PID 1340 wrote to memory of 652 1340 cmd.exe reg.exe PID 1340 wrote to memory of 652 1340 cmd.exe reg.exe PID 1340 wrote to memory of 652 1340 cmd.exe reg.exe PID 1120 wrote to memory of 676 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe svhust.exe PID 1120 wrote to memory of 676 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe svhust.exe PID 1120 wrote to memory of 676 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe svhust.exe PID 1120 wrote to memory of 676 1120 7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1096 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 676 wrote to memory of 1668 676 svhust.exe svhust.exe PID 1668 wrote to memory of 1756 1668 svhust.exe AdobeART.exe PID 1668 wrote to memory of 1756 1668 svhust.exe AdobeART.exe PID 1668 wrote to memory of 1756 1668 svhust.exe AdobeART.exe PID 1668 wrote to memory of 1756 1668 svhust.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1756 wrote to memory of 1712 1756 AdobeART.exe AdobeART.exe PID 1712 wrote to memory of 2000 1712 AdobeART.exe svhust.exe PID 1712 wrote to memory of 2000 1712 AdobeART.exe svhust.exe PID 1712 wrote to memory of 2000 1712 AdobeART.exe svhust.exe PID 1712 wrote to memory of 2000 1712 AdobeART.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 976 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 1648 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 1648 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 1648 2000 svhust.exe svhust.exe PID 2000 wrote to memory of 1648 2000 svhust.exe svhust.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe"C:\Users\Admin\AppData\Local\Temp\7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:316 -
C:\Users\Admin\AppData\Local\Temp\7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe"C:\Users\Admin\AppData\Local\Temp\7b676bc7d4f48858ce8ed5ea7d5d2f0deed09042f21b1fc03339b3a6f11d955c.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1120 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\CFVRS.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1340 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f4⤵
- Adds Run key to start application
PID:652 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:676 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1756 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1648 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1304
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5e83a2e0b3c1e03dfb96ffd9924117a45
SHA127a3e4ba115ba1bad0bf094f5b97e768d1ece33e
SHA256655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13
SHA5125f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3
-
Filesize
152KB
MD5bb73879be39e72e59a0f52c7858da83c
SHA15cab62702abe7cfe4fdef18ad9e2abe4083a4f0a
SHA256ae3787d9fe86131ab4704cb1682a0f7b531e02e565f917ceddadc3fdf9b4b841
SHA512777c65f78dff957072bd04b2d9dec9b6c3d9b5f5543831315f279d1354c1fc7d0962b5efdb53f85634c148ce041420069647f521631368766d59a5bdb277f9d3