Analysis
-
max time kernel
146s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
04/12/2022, 00:53
Behavioral task
behavioral1
Sample
f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe
Resource
win10v2004-20220901-en
General
-
Target
f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe
-
Size
25KB
-
MD5
ed0254080a949b33a98234043e56f0d7
-
SHA1
15e1d156d2610e17a7fa06225fdfdefc091f6323
-
SHA256
f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303
-
SHA512
eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329
-
SSDEEP
384:MUU39SStAWybDMz6HAHNHiGtDNPTVoLDYuFdslvr6gL3lR0NIgdd6xl3sy3jSqM2:oSStAWybQ6Haz96dsdNLUZdwlD3jSq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1692 SVSH0ST.EXE -
resource yara_rule behavioral1/files/0x000500000000b2d2-55.dat upx behavioral1/files/0x000500000000b2d2-56.dat upx behavioral1/files/0x000500000000b2d2-58.dat upx behavioral1/memory/948-65-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/memory/1692-67-0x0000000000400000-0x0000000000415000-memory.dmp upx behavioral1/files/0x000500000000b2d2-68.dat upx behavioral1/memory/1692-69-0x0000000000400000-0x0000000000415000-memory.dmp upx -
Deletes itself 1 IoCs
pid Process 1228 cmd.exe -
Loads dropped DLL 2 IoCs
pid Process 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe -
Reads user/profile data of web browsers 2 TTPs
Infostealers often target stored browser data, which can include saved credentials etc.
-
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\svchost = "C:\\Windows\\system32\\SVSH0ST.EXE" reg.exe -
Enumerates connected drives 3 TTPs 22 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\q: SVSH0ST.EXE File opened (read-only) \??\s: SVSH0ST.EXE File opened (read-only) \??\x: SVSH0ST.EXE File opened (read-only) \??\y: SVSH0ST.EXE File opened (read-only) \??\p: SVSH0ST.EXE File opened (read-only) \??\h: SVSH0ST.EXE File opened (read-only) \??\k: SVSH0ST.EXE File opened (read-only) \??\m: SVSH0ST.EXE File opened (read-only) \??\t: SVSH0ST.EXE File opened (read-only) \??\u: SVSH0ST.EXE File opened (read-only) \??\v: SVSH0ST.EXE File opened (read-only) \??\w: SVSH0ST.EXE File opened (read-only) \??\f: SVSH0ST.EXE File opened (read-only) \??\j: SVSH0ST.EXE File opened (read-only) \??\l: SVSH0ST.EXE File opened (read-only) \??\n: SVSH0ST.EXE File opened (read-only) \??\o: SVSH0ST.EXE File opened (read-only) \??\z: SVSH0ST.EXE File opened (read-only) \??\g: SVSH0ST.EXE File opened (read-only) \??\i: SVSH0ST.EXE File opened (read-only) \??\r: SVSH0ST.EXE File opened (read-only) \??\e: SVSH0ST.EXE -
Drops autorun.inf file 1 TTPs 7 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File opened for modification C:\Windows\SysWOW64\autorun.inf SVSH0ST.EXE File created C:\Windows\SysWOW64\Autorun.inf SVSH0ST.EXE File created C:\autorun.inf SVSH0ST.EXE File opened for modification C:\autorun.inf SVSH0ST.EXE File created \??\c:\autorun.inf SVSH0ST.EXE File opened for modification \??\c:\autorun.inf SVSH0ST.EXE File opened for modification C:\Windows\SysWOW64\Autorun.inf SVSH0ST.EXE -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\SVSH0ST.EXE f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe File opened for modification C:\Windows\SysWOW64\SVSH0ST.EXE f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe File opened for modification C:\Windows\SysWOW64\SVSH0ST.EXE SVSH0ST.EXE File opened for modification C:\Windows\SysWOW64\autorun.inf SVSH0ST.EXE File created C:\Windows\SysWOW64\Autorun.inf SVSH0ST.EXE File opened for modification C:\Windows\SysWOW64\Autorun.inf SVSH0ST.EXE -
Drops file in Program Files directory 43 IoCs
description ioc Process File opened for modification \??\c:\Program Files (x86)\Adobe\Reader 9.0\ReadMe.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Garden.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Soft Blue.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\DADSHIRT.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Green Bubbles.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Hand Prints.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Shades of Blue.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\dcommon\html\cpyr.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\JUNGLE.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Green Bubbles.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Hand Prints.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Stars.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\OSPP.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Bears.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Soft Blue.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\PINELUMB.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\NOTEBOOK.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\OFFISUPP.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\olh001.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Peacock.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\AccessWeb\CLNTWRAP.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\CURRENCY.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\SEAMARBL.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Stars.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\title.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\OFFICE14\1033\README.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms3\FormsVersion1Warning.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms\FormsVersion1Warning.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Office14\Groove\ToolData\groove.net\GrooveForms4\FormsVersion1Warning.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\JUDGESCH.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Orange Circles.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Roses.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Java\jdk1.7.0_80\lib\missioncontrol\plugins\com.jrockit.mc.console.ui.notification_5.5.0.165303\html\preface.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Roses.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Garden.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files\Common Files\Microsoft Shared\Stationery\Peacock.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\PAWPRINT.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Microsoft Office\Stationery\1033\TECHTOOL.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Smart Tag\1033\MCABOUT.HTM SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Bears.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Orange Circles.htm SVSH0ST.EXE File opened for modification \??\c:\Program Files (x86)\Common Files\microsoft shared\Stationery\Shades of Blue.htm SVSH0ST.EXE -
Drops file in Windows directory 64 IoCs
description ioc Process File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\403-9.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\500-14.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\404-6.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\500-16.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\404-3.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\404-4.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\401-1.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\404-6.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\403.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\403-2.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\403-10.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\405.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\500-16.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\403-4.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\404-12.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-1.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\403-10.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\403-12.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7601.17514_none_f35f9773adf74c06\Peacock.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\x86_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7601.17514_none_f35f9773adf74c06\Green Bubbles.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\404-8.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\412.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\401-5.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-7.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\401-3.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\403-7.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-2.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\405.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\403-9.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\404-13.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\401-2.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\500-19.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\403-16.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\404-13.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\501.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-mail-app_31bf3856ad364e35_6.1.7601.17514_none_4f7e32f76654bd3c\Bears.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\403.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\403-8.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\401-5.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\403-5.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\403-9.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\403-14.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\403-17.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-10.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-12.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\403-1.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\404-13.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\403-11.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\403-19.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\403-19.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\404.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\401-4.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\403-7.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\403-13.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\404-14.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_ja-jp_e74ded66652fb660\404-9.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\401-5.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_es-es_b8490213a810a8a5\500-14.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\403-1.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_fr-fr_5b0078129ae2bf07\404-12.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\403-18.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_it-it_45286e597214a485\502.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_de-de_0f8ccf36b90bab3b\404.htm SVSH0ST.EXE File opened for modification \??\c:\Windows\winsxs\amd64_microsoft-windows-i..sbinaries.resources_31bf3856ad364e35_6.1.7600.16385_en-us_b87da52fa7e9b700\403-12.htm SVSH0ST.EXE -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main reg.exe -
Modifies Internet Explorer start page 1 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "www.baidu.com" reg.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1940 reg.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeSystemtimePrivilege 1692 SVSH0ST.EXE -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 948 wrote to memory of 1692 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 27 PID 948 wrote to memory of 1692 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 27 PID 948 wrote to memory of 1692 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 27 PID 948 wrote to memory of 1692 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 27 PID 1692 wrote to memory of 1940 1692 SVSH0ST.EXE 28 PID 1692 wrote to memory of 1940 1692 SVSH0ST.EXE 28 PID 1692 wrote to memory of 1940 1692 SVSH0ST.EXE 28 PID 1692 wrote to memory of 1940 1692 SVSH0ST.EXE 28 PID 1692 wrote to memory of 2036 1692 SVSH0ST.EXE 32 PID 1692 wrote to memory of 2036 1692 SVSH0ST.EXE 32 PID 1692 wrote to memory of 2036 1692 SVSH0ST.EXE 32 PID 1692 wrote to memory of 2036 1692 SVSH0ST.EXE 32 PID 1692 wrote to memory of 1072 1692 SVSH0ST.EXE 31 PID 1692 wrote to memory of 1072 1692 SVSH0ST.EXE 31 PID 1692 wrote to memory of 1072 1692 SVSH0ST.EXE 31 PID 1692 wrote to memory of 1072 1692 SVSH0ST.EXE 31 PID 948 wrote to memory of 560 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 34 PID 948 wrote to memory of 560 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 34 PID 948 wrote to memory of 560 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 34 PID 948 wrote to memory of 560 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 34 PID 948 wrote to memory of 1228 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 35 PID 948 wrote to memory of 1228 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 35 PID 948 wrote to memory of 1228 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 35 PID 948 wrote to memory of 1228 948 f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe"C:\Users\Admin\AppData\Local\Temp\f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.exe"1⤵
- Loads dropped DLL
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Windows\SysWOW64\SVSH0ST.EXEC:\Windows\system32\SVSH0ST.EXE2⤵
- Executes dropped EXE
- Enumerates connected drives
- Drops autorun.inf file
- Drops file in System32 directory
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1692 -
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run /V svchost /T REG_SZ /D C:\Windows\system32\SVSH0ST.EXE /F3⤵
- Adds Run key to start application
- Modifies registry key
PID:1940
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKCU\Software\Policies\Microsoft\Internet Explorer\Control Panel" /v "HomePage" /t REG_DWORD /d 00000001 /f3⤵PID:1072
-
-
C:\Windows\SysWOW64\reg.exe"C:\Windows\System32\reg.exe" add "HKCU\Software\Microsoft\Internet Explorer\Main" /v "Start Page" /t REG_EXPAND_SZ /d www.baidu.com /f3⤵
- Modifies Internet Explorer settings
- Modifies Internet Explorer start page
PID:2036
-
-
-
C:\Windows\SysWOW64\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.bat2⤵PID:560
-
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.bat""2⤵
- Deletes itself
PID:1228
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303.bat
Filesize248B
MD593128d293bd5de4973b1c4776028c31f
SHA184409eacf57fd1ed9839cbeab7cee722cfd4ab53
SHA2565ae126e18863b2947fd38640d1ca4022db7247bb1b168571bb4c96c0a269a653
SHA512b716ef2b378888b7430e6cc380dda0c6f98d1b48de14af2d75be0272d5b6e2eb22e09e4d36ccc72d0bebcad18f820244aaef6aaaae3ba54ab945c06fdfaf9cb4
-
Filesize
25KB
MD5ed0254080a949b33a98234043e56f0d7
SHA115e1d156d2610e17a7fa06225fdfdefc091f6323
SHA256f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303
SHA512eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329
-
Filesize
25KB
MD5ed0254080a949b33a98234043e56f0d7
SHA115e1d156d2610e17a7fa06225fdfdefc091f6323
SHA256f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303
SHA512eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329
-
Filesize
25KB
MD5ed0254080a949b33a98234043e56f0d7
SHA115e1d156d2610e17a7fa06225fdfdefc091f6323
SHA256f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303
SHA512eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329
-
Filesize
25KB
MD5ed0254080a949b33a98234043e56f0d7
SHA115e1d156d2610e17a7fa06225fdfdefc091f6323
SHA256f66fdaab89cb70d793d0b8ac248735ead13413463765ab8e224975542861e303
SHA512eb029ee30f48b7451573d87db999dc471ea2893b8d1ff2aa1561e4f4e6f7dedc381b4bb025e5bc56314201b889f73c1eaa7efbd7603c41a95fa411843154f329