Analysis

  • max time kernel
    146s
  • max time network
    107s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20231130-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20231130-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11-12-2023 23:34

General

  • Target

    slmvsrv.exe

  • Size

    658KB

  • MD5

    bb9818d76fe60e68608e2a1e7bc6666b

  • SHA1

    8427c53e51681bbc6120e52f2f0fa312a540d533

  • SHA256

    4fe95e6d975784469720be171c22280ba3c050fde781f2361d41e3cd4a0318c0

  • SHA512

    fc9abd826105d8243e54fb1806a4cb0b5e0e0909c1579bbea03ecda3e62ead96d7ef1bc065a524b2c9376ed3e1fe811418c1bbd6914ef24ed69e81d1c836ff1c

  • SSDEEP

    12288:AZH5FDHpNnNeDoLEZC9Kqp4p8AZNV0y8ezXuBLtQ19tIwoI:AZHbrnyo449Kqi3fV0yxzXuBa9tbt

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • VMProtect packed file 4 IoCs

    Detects executables packed with VMProtect commercial packer.

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\slmvsrv.exe
    "C:\Users\Admin\AppData\Local\Temp\slmvsrv.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3912
    • C:\ProgramData\srtserv\slmvsrv.exe
      C:\ProgramData\srtserv\slmvsrv.exe -wait
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of SetWindowsHookEx
      PID:3652

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\srtserv\sdata.dll

    Filesize

    102KB

    MD5

    57165b3d09a2ae0c964de6cf4b28be60

    SHA1

    8b1873f14911e8dcb5f5435c52573c834b3a5ddf

    SHA256

    6723cfaca05c193f244f1760bdfcf14065a04d3d92baec9b3be670a1ed05a38c

    SHA512

    c5ccf9f96c1bc22bd0e3b1d26367b8c2373a9b5dc357e454fa08e49d8f4bcd539c562d1ac521fdc3bd447f17bc939d40a192f6f1dbccba07f028da8fff8df654

  • C:\ProgramData\srtserv\slmvsrv.exe

    Filesize

    658KB

    MD5

    bb9818d76fe60e68608e2a1e7bc6666b

    SHA1

    8427c53e51681bbc6120e52f2f0fa312a540d533

    SHA256

    4fe95e6d975784469720be171c22280ba3c050fde781f2361d41e3cd4a0318c0

    SHA512

    fc9abd826105d8243e54fb1806a4cb0b5e0e0909c1579bbea03ecda3e62ead96d7ef1bc065a524b2c9376ed3e1fe811418c1bbd6914ef24ed69e81d1c836ff1c

  • memory/3652-27-0x00000000026B0000-0x00000000026E4000-memory.dmp

    Filesize

    208KB

  • memory/3652-15-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3652-18-0x0000000000720000-0x0000000000721000-memory.dmp

    Filesize

    4KB

  • memory/3652-26-0x00000000026B0000-0x00000000026E4000-memory.dmp

    Filesize

    208KB

  • memory/3652-29-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3652-30-0x00000000026B0000-0x00000000026E4000-memory.dmp

    Filesize

    208KB

  • memory/3912-8-0x0000000000760000-0x0000000000761000-memory.dmp

    Filesize

    4KB

  • memory/3912-1-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3912-12-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3912-2-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB

  • memory/3912-0-0x0000000000400000-0x000000000057B000-memory.dmp

    Filesize

    1.5MB