Analysis
-
max time kernel
137s -
max time network
154s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
10-12-2022 14:35
Static task
static1
Behavioral task
behavioral1
Sample
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe
Resource
win10-20220812-en
Behavioral task
behavioral3
Sample
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe
Resource
win10v2004-20221111-en
General
-
Target
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe
-
Size
344KB
-
MD5
1c14b2baf9e19985a4ed398afd33442c
-
SHA1
c26a47518bab73ac6d4dbd51b13d92ddbaba11a0
-
SHA256
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3
-
SHA512
3b793498a4ee2c22682bfc64e4caab83058844c0033f427646ee9b6aafb45cc0162d2c00115c9b0e802c56d32377ad7a401616ce0fbc384fd1642a1c04e888a6
-
SSDEEP
3072:ZzB7tUUhTH5P/hS+39cS+392C1XTxlwXfmgMk:H7tpJ5P/539C392sTbwXfmgx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchosvt.exesvchosvt.exepid process 4780 svchosvt.exe 1964 svchosvt.exe -
Creates a Windows Service
-
Drops file in Windows directory 2 IoCs
Processes:
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exedescription ioc process File created C:\Windows\svchosvt.exe dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe File opened for modification C:\Windows\svchosvt.exe dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe -
Suspicious behavior: EnumeratesProcesses 12 IoCs
Processes:
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exesvchosvt.exesvchosvt.exepid process 2716 dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe 2716 dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe 2716 dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe 2716 dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe 4780 svchosvt.exe 4780 svchosvt.exe 4780 svchosvt.exe 4780 svchosvt.exe 1964 svchosvt.exe 1964 svchosvt.exe 1964 svchosvt.exe 1964 svchosvt.exe -
Suspicious behavior: RenamesItself 1 IoCs
Processes:
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exepid process 2716 dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exesvchosvt.exesvchosvt.exepid process 2716 dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe 4780 svchosvt.exe 1964 svchosvt.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
svchosvt.exedescription pid process target process PID 4780 wrote to memory of 1964 4780 svchosvt.exe svchosvt.exe PID 4780 wrote to memory of 1964 4780 svchosvt.exe svchosvt.exe PID 4780 wrote to memory of 1964 4780 svchosvt.exe svchosvt.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe"C:\Users\Admin\AppData\Local\Temp\dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: RenamesItself
- Suspicious use of SetWindowsHookEx
PID:2716
-
C:\Windows\svchosvt.exeC:\Windows\svchosvt.exe1⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\svchosvt.exeC:\Windows\svchosvt.exe Win72⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:1964
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
344KB
MD51c14b2baf9e19985a4ed398afd33442c
SHA1c26a47518bab73ac6d4dbd51b13d92ddbaba11a0
SHA256dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3
SHA5123b793498a4ee2c22682bfc64e4caab83058844c0033f427646ee9b6aafb45cc0162d2c00115c9b0e802c56d32377ad7a401616ce0fbc384fd1642a1c04e888a6
-
Filesize
344KB
MD51c14b2baf9e19985a4ed398afd33442c
SHA1c26a47518bab73ac6d4dbd51b13d92ddbaba11a0
SHA256dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3
SHA5123b793498a4ee2c22682bfc64e4caab83058844c0033f427646ee9b6aafb45cc0162d2c00115c9b0e802c56d32377ad7a401616ce0fbc384fd1642a1c04e888a6
-
Filesize
344KB
MD51c14b2baf9e19985a4ed398afd33442c
SHA1c26a47518bab73ac6d4dbd51b13d92ddbaba11a0
SHA256dd1a796f17bc604d6f9b4d14e194fa73a5ff4d55ac3809207c5d523e2765c7c3
SHA5123b793498a4ee2c22682bfc64e4caab83058844c0033f427646ee9b6aafb45cc0162d2c00115c9b0e802c56d32377ad7a401616ce0fbc384fd1642a1c04e888a6