Analysis
-
max time kernel
151s -
max time network
208s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
25-11-2022 19:31
Static task
static1
Behavioral task
behavioral1
Sample
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe
Resource
win10v2004-20220901-en
General
-
Target
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe
-
Size
152KB
-
MD5
bc0acc7f9dac423a62313c2bcdd08e70
-
SHA1
ecfbd5f61192e0bbce10f6753c7406b3c5f0be08
-
SHA256
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db
-
SHA512
4cf99e473d3fc3166072ab8c0ed8ef55acf0309e76896890d0c361915bbd179b1a4fe3e53f6170dbe0eb4b0bd38beb700af9c5a61b3a53db9816419843071744
-
SSDEEP
1536:c1DMz1DQvXLq6t7awFONecenlLnQHIG5R9c73P600t:9eGw9A0rC00t
Malware Config
Signatures
-
ModiLoader, DBatLoader
ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.
-
ModiLoader Second Stage 8 IoCs
Processes:
resource yara_rule behavioral1/memory/304-112-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/304-113-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1588-170-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1588-173-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1632-229-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1252-277-0x0000000000412D20-mapping.dmp modiloader_stage2 behavioral1/memory/1252-286-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 behavioral1/memory/1252-291-0x0000000000400000-0x0000000000414000-memory.dmp modiloader_stage2 -
Executes dropped EXE 18 IoCs
Processes:
svhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exesvhust.exepid process 908 svhust.exe 1508 svhust.exe 304 svhust.exe 1984 AdobeART.exe 2036 AdobeART.exe 836 svhust.exe 1264 svhust.exe 1588 svhust.exe 1100 AdobeART.exe 1240 AdobeART.exe 1308 svhust.exe 1128 svhust.exe 1632 svhust.exe 1776 AdobeART.exe 1512 AdobeART.exe 1852 svhust.exe 1724 svhust.exe 1252 svhust.exe -
Processes:
resource yara_rule behavioral1/memory/596-59-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-61-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-62-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-65-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-66-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-69-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/596-71-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/304-95-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/304-99-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/304-101-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/596-107-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1508-108-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/304-109-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/304-111-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/304-112-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/304-113-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/2036-135-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1508-137-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/2036-167-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1588-169-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1588-170-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1588-173-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1240-192-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1264-193-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1240-225-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1632-229-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1512-251-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1512-284-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1252-286-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1724-287-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1264-289-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1128-290-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1252-291-0x0000000000400000-0x0000000000414000-memory.dmp upx behavioral1/memory/1724-292-0x0000000000400000-0x000000000040B000-memory.dmp upx -
Loads dropped DLL 17 IoCs
Processes:
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exepid process 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 304 svhust.exe 304 svhust.exe 2036 AdobeART.exe 2036 AdobeART.exe 2036 AdobeART.exe 1588 svhust.exe 1240 AdobeART.exe 1240 AdobeART.exe 1240 AdobeART.exe 1632 svhust.exe 1512 AdobeART.exe 1512 AdobeART.exe 1512 AdobeART.exe -
Adds Run key to start application 2 TTPs 3 IoCs
Processes:
reg.exesvhust.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhust = "C:\\Users\\Admin\\AppData\\Roaming\\svhust\\svhust.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\AdobeART = "C:\\Users\\Admin\\AppData\\Roaming\\AdobeART.exe" svhust.exe -
Suspicious use of SetThreadContext 12 IoCs
Processes:
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exesvhust.exeAdobeART.exesvhust.exedescription pid process target process PID 2008 set thread context of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 908 set thread context of 1508 908 svhust.exe svhust.exe PID 908 set thread context of 304 908 svhust.exe svhust.exe PID 1984 set thread context of 2036 1984 AdobeART.exe AdobeART.exe PID 836 set thread context of 1264 836 svhust.exe svhust.exe PID 836 set thread context of 1588 836 svhust.exe svhust.exe PID 1100 set thread context of 1240 1100 AdobeART.exe AdobeART.exe PID 1308 set thread context of 1128 1308 svhust.exe svhust.exe PID 1308 set thread context of 1632 1308 svhust.exe svhust.exe PID 1776 set thread context of 1512 1776 AdobeART.exe AdobeART.exe PID 1852 set thread context of 1724 1852 svhust.exe svhust.exe PID 1852 set thread context of 1252 1852 svhust.exe svhust.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svhust.exesvhust.exesvhust.exesvhust.exedescription pid process Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1264 svhust.exe Token: SeDebugPrivilege 1508 svhust.exe Token: SeDebugPrivilege 1724 svhust.exe Token: SeDebugPrivilege 1128 svhust.exe -
Suspicious use of SetWindowsHookEx 16 IoCs
Processes:
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exesvhust.exepid process 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 908 svhust.exe 1508 svhust.exe 1984 AdobeART.exe 2036 AdobeART.exe 836 svhust.exe 1264 svhust.exe 1100 AdobeART.exe 1240 AdobeART.exe 1308 svhust.exe 1128 svhust.exe 1776 AdobeART.exe 1512 AdobeART.exe 1852 svhust.exe 1724 svhust.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.execmd.exesvhust.exesvhust.exeAdobeART.exeAdobeART.exesvhust.exedescription pid process target process PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 2008 wrote to memory of 596 2008 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe PID 596 wrote to memory of 1160 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe cmd.exe PID 596 wrote to memory of 1160 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe cmd.exe PID 596 wrote to memory of 1160 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe cmd.exe PID 596 wrote to memory of 1160 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe cmd.exe PID 1160 wrote to memory of 1500 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1500 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1500 1160 cmd.exe reg.exe PID 1160 wrote to memory of 1500 1160 cmd.exe reg.exe PID 596 wrote to memory of 908 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe svhust.exe PID 596 wrote to memory of 908 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe svhust.exe PID 596 wrote to memory of 908 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe svhust.exe PID 596 wrote to memory of 908 596 48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 1508 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 908 wrote to memory of 304 908 svhust.exe svhust.exe PID 304 wrote to memory of 1984 304 svhust.exe AdobeART.exe PID 304 wrote to memory of 1984 304 svhust.exe AdobeART.exe PID 304 wrote to memory of 1984 304 svhust.exe AdobeART.exe PID 304 wrote to memory of 1984 304 svhust.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 1984 wrote to memory of 2036 1984 AdobeART.exe AdobeART.exe PID 2036 wrote to memory of 836 2036 AdobeART.exe svhust.exe PID 2036 wrote to memory of 836 2036 AdobeART.exe svhust.exe PID 2036 wrote to memory of 836 2036 AdobeART.exe svhust.exe PID 2036 wrote to memory of 836 2036 AdobeART.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1264 836 svhust.exe svhust.exe PID 836 wrote to memory of 1588 836 svhust.exe svhust.exe PID 836 wrote to memory of 1588 836 svhust.exe svhust.exe PID 836 wrote to memory of 1588 836 svhust.exe svhust.exe PID 836 wrote to memory of 1588 836 svhust.exe svhust.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe"C:\Users\Admin\AppData\Local\Temp\48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe"C:\Users\Admin\AppData\Local\Temp\48bec773fde29f6cdfbef932dd64e8af03674356c355082c3391a86e673f00db.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:596 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\FTSEM.bat" "3⤵
- Suspicious use of WriteProcessMemory
PID:1160 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f4⤵
- Adds Run key to start application
PID:1500 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:908 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:304 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:836 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1264 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"8⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1588 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1240 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"11⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1128 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"12⤵
- Executes dropped EXE
- Loads dropped DLL
PID:1632 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"13⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Roaming\AdobeART.exe"C:\Users\Admin\AppData\Roaming\AdobeART.exe"14⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"15⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"16⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"16⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5e83a2e0b3c1e03dfb96ffd9924117a45
SHA127a3e4ba115ba1bad0bf094f5b97e768d1ece33e
SHA256655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13
SHA5125f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848
-
Filesize
152KB
MD5854605a9419ece4a0f0502686126dd22
SHA11a20d83d5a0ffa01af38df4669f6669c7a469c87
SHA2567b2c1c91c27743441ce186ea0d3c104576d76258fd83c98193e12979da89bb04
SHA5127c3ff43298f640a1d585e97cbc81835530b86e1717f98f9a2eff4b254f272cfde0c8115c021533f67f30c045603865b203e3be1ceeec04853b4da45499763848