Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31-12-2023 03:56
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
2724c0cc7adeaf144a9f772b27009fbb.exe
Resource
win7-20231129-en
windows7-x64
5 signatures
150 seconds
Behavioral task
behavioral2
Sample
2724c0cc7adeaf144a9f772b27009fbb.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
5 signatures
150 seconds
General
-
Target
2724c0cc7adeaf144a9f772b27009fbb.exe
-
Size
48KB
-
MD5
2724c0cc7adeaf144a9f772b27009fbb
-
SHA1
219f5115dabe9ee2a2836c6a1c38ed803e32adec
-
SHA256
dd4fd2160cb6c36f8fd633bf311699c505145211684965848e5ebee881aba57b
-
SHA512
60ca7811eb611ea880b923c30ff97b1763f2f98f4ad1eb2dfab089612025a21047b834a4689fa87cb8292d4272ba1fc4a8d20a930f2609f4d615fbcfc260a4a6
-
SSDEEP
768:tmXDtTNfb0EKA06c3p+xD/103coLF4NdFdMTfdE5jFeDq0X1a:IDtTR09UxjMpcrO8jEDqya
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5072 shvhost.exe 2736 shvhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Windows Services = "shvhost.exe" 2724c0cc7adeaf144a9f772b27009fbb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3320 set thread context of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 5072 set thread context of 2736 5072 shvhost.exe 105 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\shvhost.exe 2724c0cc7adeaf144a9f772b27009fbb.exe File opened for modification C:\Windows\shvhost.exe 2724c0cc7adeaf144a9f772b27009fbb.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3320 wrote to memory of 3724 3320 2724c0cc7adeaf144a9f772b27009fbb.exe 17 PID 3724 wrote to memory of 5072 3724 2724c0cc7adeaf144a9f772b27009fbb.exe 104 PID 3724 wrote to memory of 5072 3724 2724c0cc7adeaf144a9f772b27009fbb.exe 104 PID 3724 wrote to memory of 5072 3724 2724c0cc7adeaf144a9f772b27009fbb.exe 104 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105 PID 5072 wrote to memory of 2736 5072 shvhost.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\2724c0cc7adeaf144a9f772b27009fbb.exe"C:\Users\Admin\AppData\Local\Temp\2724c0cc7adeaf144a9f772b27009fbb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3320 -
C:\Users\Admin\AppData\Local\Temp\2724c0cc7adeaf144a9f772b27009fbb.exeC:\Users\Admin\AppData\Local\Temp\2724c0cc7adeaf144a9f772b27009fbb.exe2⤵
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\shvhost.exe"C:\Windows\shvhost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5072 -
C:\Windows\shvhost.exeC:\Windows\shvhost.exe4⤵
- Executes dropped EXE
PID:2736
-
-
-