Analysis
-
max time kernel
1020s -
max time network
1169s -
platform
windows11-21h2_x64 -
resource
win11-20231215-en -
resource tags
arch:x64arch:x86image:win11-20231215-enlocale:en-usos:windows11-21h2-x64system -
submitted
28-12-2023 01:31
Static task
static1
Behavioral task
behavioral1
Sample
Svchost.zip
Resource
win11-20231215-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win11-20231222-en
General
-
Target
Svchost.zip
-
Size
1.2MB
-
MD5
c09104506483313e4a721c18b59a8005
-
SHA1
ba889e573fdb792c3a5485ee8668b027d7cb2cc7
-
SHA256
e38d928bf1641c0c0eb5df9828548edc663fc33ada4c7b2b82c7679569c87fa6
-
SHA512
fd9dba491df0ebb7a7069053fb60d91e9fc03e685ec28d1d69dfa85ac82a33dcbc8c2881f939805ad0c4753217253128f132dcb025950e24ea1a12f9fccbf608
-
SSDEEP
24576:ycsZAbmNrE7cLl72oI3EsNx+MTNmN7NrqgsEjuTqC2ZFUEuKi29Wzx37g9s:cAb9ILl72bxHk7Nr7+2ZFQK/QzRg9s
Malware Config
Signatures
-
Checks SCSI registry key(s) 3 TTPs 3 IoCs
SCSI information is often read in order to detect sandboxing environments.
Processes:
Taskmgr.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\Properties\{b725f130-47ef-101a-a5f1-02608c9eebac}\000A Taskmgr.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000\FriendlyName Taskmgr.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Enum\SCSI\Disk&Ven_DADY&Prod_HARDDISK\4&215468a5&0&000000 Taskmgr.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
Taskmgr.exepid process 1832 Taskmgr.exe 1832 Taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
Taskmgr.exedescription pid process Token: SeDebugPrivilege 1832 Taskmgr.exe Token: SeSystemProfilePrivilege 1832 Taskmgr.exe Token: SeCreateGlobalPrivilege 1832 Taskmgr.exe -
Suspicious use of FindShellTrayWindow 14 IoCs
Processes:
Taskmgr.exepid process 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe -
Suspicious use of SendNotifyMessage 14 IoCs
Processes:
Taskmgr.exepid process 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe 1832 Taskmgr.exe
Processes
-
C:\Windows\Explorer.exeC:\Windows\Explorer.exe /idlist,,C:\Users\Admin\AppData\Local\Temp\Svchost.zip1⤵
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵
-
C:\Windows\System32\Taskmgr.exe"C:\Windows\System32\Taskmgr.exe"1⤵
- Checks SCSI registry key(s)
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of SendNotifyMessage
-
C:\Users\Admin\Desktop\svchost.exe"C:\Users\Admin\Desktop\svchost.exe"1⤵
-
C:\Users\Admin\Desktop\svchost.exe"C:\Users\Admin\Desktop\svchost.exe"1⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/1832-2-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-12-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-11-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-10-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-9-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-8-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-7-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-6-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-1-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB
-
memory/1832-0-0x000001552EB30000-0x000001552EB31000-memory.dmpFilesize
4KB