Analysis

  • max time kernel
    148s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230220-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system
  • submitted
    21/04/2023, 01:12

General

  • Target

    svchost.exe

  • Size

    283KB

  • MD5

    820999a17f6c2b1d67b4d81db8a9be4a

  • SHA1

    db2349dde07e3bc8ecd9ef8704be7fe8d923a587

  • SHA256

    b0cf99edf8af0ae79fa70a46fd38f03fea4146067ab41e9aea100aa4c96a2d38

  • SHA512

    211433be1d58b14c7f7d229a27607716b3f6db94aeeb054888d48f167b7ad0a996c5ccf413ff6b2857545a2f4b178d883e97ebbff0bcf4d6caa350dcabc746bb

  • SSDEEP

    6144:Aj12paTknvnpNjsxpwcG+eYkmlynjsETa4HXueA1qDf0eTL2gFK:i2pbvCtGvYkm1ETx3ueAADTag

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs 1 IoCs
  • Drops startup file 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost.exe"
    1⤵
    • Drops startup file
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\SYSTEM32\netsh.exe
      netsh firewall add allowedprogram "C:\Users\Admin\AppData\Local\Temp\svchost.exe" "svchost.exe" ENABLE
      2⤵
      • Modifies Windows Firewall
      PID:2984

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\6b186bd30a9f87b8492726112c5cb4ad.exe

    Filesize

    283KB

    MD5

    820999a17f6c2b1d67b4d81db8a9be4a

    SHA1

    db2349dde07e3bc8ecd9ef8704be7fe8d923a587

    SHA256

    b0cf99edf8af0ae79fa70a46fd38f03fea4146067ab41e9aea100aa4c96a2d38

    SHA512

    211433be1d58b14c7f7d229a27607716b3f6db94aeeb054888d48f167b7ad0a996c5ccf413ff6b2857545a2f4b178d883e97ebbff0bcf4d6caa350dcabc746bb

  • memory/1668-133-0x0000000000140000-0x000000000018C000-memory.dmp

    Filesize

    304KB

  • memory/1668-134-0x000000001B3C0000-0x000000001B466000-memory.dmp

    Filesize

    664KB

  • memory/1668-135-0x0000000002560000-0x000000000256E000-memory.dmp

    Filesize

    56KB

  • memory/1668-136-0x000000001D4D0000-0x000000001D99E000-memory.dmp

    Filesize

    4.8MB

  • memory/1668-139-0x000000001DB40000-0x000000001DBDC000-memory.dmp

    Filesize

    624KB

  • memory/1668-140-0x00000000025A0000-0x00000000025A8000-memory.dmp

    Filesize

    32KB