Analysis
-
max time kernel
9s -
max time network
150s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
23-01-2024 13:44
Behavioral task
behavioral1
Sample
svchost_dump_SCY - Copy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
svchost_dump_SCY - Copy.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
svchost_dump_SCY - Copy.exe
Resource
win10v2004-20231215-en
General
-
Target
svchost_dump_SCY - Copy.exe
-
Size
5.2MB
-
MD5
5fd3d21a968f4b8a1577b5405ab1c36a
-
SHA1
710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
-
SHA256
7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
-
SHA512
085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
SSDEEP
98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs
Malware Config
Signatures
-
Detects BazaLoader malware 9 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral1/memory/2324-0-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader \Windows\system\svchost.exe BazaLoader behavioral1/memory/1036-37-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader behavioral1/memory/2324-34-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader C:\Windows\system\svchost.exe BazaLoader C:\Windows\system\svchost.exe BazaLoader \Windows\system\svchost.exe BazaLoader behavioral1/memory/2324-38-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader behavioral1/memory/1036-64-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader -
Modifies Windows Firewall 1 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 2964 netsh.exe 2676 netsh.exe 1116 netsh.exe 1428 netsh.exe -
Drops file in Windows directory 1 IoCs
Processes:
svchost_dump_SCY - Copy.exedescription ioc process File created C:\Windows\System\xxx1.bak svchost_dump_SCY - Copy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious use of AdjustPrivilegeToken 40 IoCs
Processes:
WMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 1920 WMIC.exe Token: SeSecurityPrivilege 1920 WMIC.exe Token: SeTakeOwnershipPrivilege 1920 WMIC.exe Token: SeLoadDriverPrivilege 1920 WMIC.exe Token: SeSystemProfilePrivilege 1920 WMIC.exe Token: SeSystemtimePrivilege 1920 WMIC.exe Token: SeProfSingleProcessPrivilege 1920 WMIC.exe Token: SeIncBasePriorityPrivilege 1920 WMIC.exe Token: SeCreatePagefilePrivilege 1920 WMIC.exe Token: SeBackupPrivilege 1920 WMIC.exe Token: SeRestorePrivilege 1920 WMIC.exe Token: SeShutdownPrivilege 1920 WMIC.exe Token: SeDebugPrivilege 1920 WMIC.exe Token: SeSystemEnvironmentPrivilege 1920 WMIC.exe Token: SeRemoteShutdownPrivilege 1920 WMIC.exe Token: SeUndockPrivilege 1920 WMIC.exe Token: SeManageVolumePrivilege 1920 WMIC.exe Token: 33 1920 WMIC.exe Token: 34 1920 WMIC.exe Token: 35 1920 WMIC.exe Token: SeIncreaseQuotaPrivilege 1920 WMIC.exe Token: SeSecurityPrivilege 1920 WMIC.exe Token: SeTakeOwnershipPrivilege 1920 WMIC.exe Token: SeLoadDriverPrivilege 1920 WMIC.exe Token: SeSystemProfilePrivilege 1920 WMIC.exe Token: SeSystemtimePrivilege 1920 WMIC.exe Token: SeProfSingleProcessPrivilege 1920 WMIC.exe Token: SeIncBasePriorityPrivilege 1920 WMIC.exe Token: SeCreatePagefilePrivilege 1920 WMIC.exe Token: SeBackupPrivilege 1920 WMIC.exe Token: SeRestorePrivilege 1920 WMIC.exe Token: SeShutdownPrivilege 1920 WMIC.exe Token: SeDebugPrivilege 1920 WMIC.exe Token: SeSystemEnvironmentPrivilege 1920 WMIC.exe Token: SeRemoteShutdownPrivilege 1920 WMIC.exe Token: SeUndockPrivilege 1920 WMIC.exe Token: SeManageVolumePrivilege 1920 WMIC.exe Token: 33 1920 WMIC.exe Token: 34 1920 WMIC.exe Token: 35 1920 WMIC.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
svchost_dump_SCY - Copy.exedescription pid process target process PID 2324 wrote to memory of 1920 2324 svchost_dump_SCY - Copy.exe WMIC.exe PID 2324 wrote to memory of 1920 2324 svchost_dump_SCY - Copy.exe WMIC.exe PID 2324 wrote to memory of 1920 2324 svchost_dump_SCY - Copy.exe WMIC.exe PID 2324 wrote to memory of 2964 2324 svchost_dump_SCY - Copy.exe netsh.exe PID 2324 wrote to memory of 2964 2324 svchost_dump_SCY - Copy.exe netsh.exe PID 2324 wrote to memory of 2964 2324 svchost_dump_SCY - Copy.exe netsh.exe PID 2324 wrote to memory of 2676 2324 svchost_dump_SCY - Copy.exe netsh.exe PID 2324 wrote to memory of 2676 2324 svchost_dump_SCY - Copy.exe netsh.exe PID 2324 wrote to memory of 2676 2324 svchost_dump_SCY - Copy.exe netsh.exe PID 2324 wrote to memory of 2232 2324 svchost_dump_SCY - Copy.exe powershell.exe PID 2324 wrote to memory of 2232 2324 svchost_dump_SCY - Copy.exe powershell.exe PID 2324 wrote to memory of 2232 2324 svchost_dump_SCY - Copy.exe powershell.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2324 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1920 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2964 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2676 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵PID:2232
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵PID:2724
-
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"2⤵PID:2736
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:1960 -
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵PID:1036
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1116 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1428 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵PID:608
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵PID:2448
-
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName1⤵PID:2904
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD514cfef0e6f5d3560dfd7ad3ec35c5542
SHA1c7892724101005ecb8ed9154685fc0575ac2cdf6
SHA25661b701ecf35429f18b0e7e9fd7da4bd1908f6ad8f5bdb022114964c8a05fdffd
SHA512d140a9b06c1c233da7d0a001237ea62553af3d28fcd29e4a4da062de2b9023acc3f1d9973f438c650d75ae280c7b4668dccf7fc2061602e19089317542cef96e
-
Filesize
226KB
MD5ac0a85d50ef7db6c0ac51ba4fdfcd3eb
SHA1b9cfff58a1e3b9052ea537c008f4e2edc6d4e492
SHA2563e8d823836701bcca3c5828a3e51ca395a6fbfbe024880af18e7c2c5053eb492
SHA512afd955d231a926a2c47dd590d314cdd06406477cfb007c1d27d8e6a118799f734f001bc87fbf0f4fac5ba94320dbc4992e06770b59d94e1ffbad8ca973db512d
-
Filesize
23KB
MD52a068f63de91d8c7325ed05850e5d682
SHA1fa95ccc5c3c1d206b2e82c9aec2445631e5949df
SHA256417724515176253fa7db402e9e3e6935c9bf752dc44fd4bf81b7e8bcd86584a6
SHA512b2766026c5d59e251b48fd4df253dd2e4135ec7bd2c70b8a29ed9677e329574ca3a9d92af5e538f546bbb47e0474a7671ad83e24f5daa78f4f9ca4dca901b09f
-
Filesize
267KB
MD5dc33dc5be9110424fad3c3ba244fd381
SHA1a35f6447573e80314b8133faf67d4cb060486caf
SHA25687c0f646da25345b0109a77f6b39a7191731a3a6e3aa47ea6569c065573d439e
SHA512cc88c2d56f50ef9652e30f8032777ad312b63b0887c269a68aef2775d532975fe83415fd9ea534ff0ac5b291ba92162f776bcb0a458319f1dd1e381235f2df65
-
Filesize
695KB
MD5615ef32c247a2c14142a20d4ea9f975c
SHA17da6baaa5b1019831f6261037d4c5206f390a516
SHA2566a5f195087b79924a0dacc8c98d87ac1a52d0bd9d992f5c7e37760e41430516e
SHA5120a1f6d333dd3fc9266c4a8c06055f746f40c9f88c9a7f4aa13f181a16cbf23803774fc1dc1300b8185de7ff2727dc6716d9ac8421be98089df8e4e6359e4076b
-
Filesize
675KB
MD5ad7decf1b462516cd5e080abee40cb24
SHA1d13d41aada29b970af1be1b0af92a57017ef7602
SHA25608cfe483a1539ca37c64c7163b867f818012e9c86f50e021db779c24280fb377
SHA51238904e968c655e4d04204e361b15f9ec21698f559465b37f16f5e034b50a12ca7d29769a65766b97388572e101c337dd7dc98de516ff3d7d10af05eccf607f4e
-
Filesize
240KB
MD5abe26ff686c4854ab40c0c8e35417d32
SHA157e3710bc619994ec6b17b6b0c0e83b30f9b6fda
SHA25625401d389646b64d614361ac788ff0068efdfcfbf3af7aff488f256fad9b2705
SHA512efe30a9ba7dd33890535c7561d2d7d7a3a8131c26d609bd08360bdbc77958714335ad1d162f26a204187ceb3c6f1e866c1d96406b4f3b38a75275b7087479e8d