Analysis
-
max time kernel
146s -
max time network
107s -
platform
windows10-2004_x64 -
resource
win10v2004-20231130-en -
resource tags
arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system -
submitted
11-12-2023 23:34
Static task
static1
Behavioral task
behavioral1
Sample
slmvsrv.exe
Resource
win7-20231025-en
Behavioral task
behavioral2
Sample
slmvsrv.exe
Resource
win10v2004-20231130-en
General
-
Target
slmvsrv.exe
-
Size
658KB
-
MD5
bb9818d76fe60e68608e2a1e7bc6666b
-
SHA1
8427c53e51681bbc6120e52f2f0fa312a540d533
-
SHA256
4fe95e6d975784469720be171c22280ba3c050fde781f2361d41e3cd4a0318c0
-
SHA512
fc9abd826105d8243e54fb1806a4cb0b5e0e0909c1579bbea03ecda3e62ead96d7ef1bc065a524b2c9376ed3e1fe811418c1bbd6914ef24ed69e81d1c836ff1c
-
SSDEEP
12288:AZH5FDHpNnNeDoLEZC9Kqp4p8AZNV0y8ezXuBLtQ19tIwoI:AZHbrnyo449Kqi3fV0yxzXuBa9tbt
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 3652 slmvsrv.exe -
Loads dropped DLL 2 IoCs
pid Process 3652 slmvsrv.exe 3652 slmvsrv.exe -
resource yara_rule behavioral2/files/0x0008000000023201-20.dat vmprotect behavioral2/memory/3652-27-0x00000000026B0000-0x00000000026E4000-memory.dmp vmprotect behavioral2/memory/3652-26-0x00000000026B0000-0x00000000026E4000-memory.dmp vmprotect behavioral2/memory/3652-30-0x00000000026B0000-0x00000000026E4000-memory.dmp vmprotect -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\srtserv = "C:\\ProgramData\\srtserv\\slmvsrv.exe" slmvsrv.exe -
Suspicious behavior: EnumeratesProcesses 24 IoCs
pid Process 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe 3652 slmvsrv.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 3652 slmvsrv.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3912 wrote to memory of 3652 3912 slmvsrv.exe 88 PID 3912 wrote to memory of 3652 3912 slmvsrv.exe 88 PID 3912 wrote to memory of 3652 3912 slmvsrv.exe 88
Processes
-
C:\Users\Admin\AppData\Local\Temp\slmvsrv.exe"C:\Users\Admin\AppData\Local\Temp\slmvsrv.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:3912 -
C:\ProgramData\srtserv\slmvsrv.exeC:\ProgramData\srtserv\slmvsrv.exe -wait2⤵
- Executes dropped EXE
- Loads dropped DLL
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:3652
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
102KB
MD557165b3d09a2ae0c964de6cf4b28be60
SHA18b1873f14911e8dcb5f5435c52573c834b3a5ddf
SHA2566723cfaca05c193f244f1760bdfcf14065a04d3d92baec9b3be670a1ed05a38c
SHA512c5ccf9f96c1bc22bd0e3b1d26367b8c2373a9b5dc357e454fa08e49d8f4bcd539c562d1ac521fdc3bd447f17bc939d40a192f6f1dbccba07f028da8fff8df654
-
Filesize
658KB
MD5bb9818d76fe60e68608e2a1e7bc6666b
SHA18427c53e51681bbc6120e52f2f0fa312a540d533
SHA2564fe95e6d975784469720be171c22280ba3c050fde781f2361d41e3cd4a0318c0
SHA512fc9abd826105d8243e54fb1806a4cb0b5e0e0909c1579bbea03ecda3e62ead96d7ef1bc065a524b2c9376ed3e1fe811418c1bbd6914ef24ed69e81d1c836ff1c