Resubmissions

12/04/2024, 13:32

240412-qtgfpsag84 8

12/04/2024, 13:32

240412-qtc4aaag83 8

12/04/2024, 13:32

240412-qtcshsag82 8

12/04/2024, 13:32

240412-qtb6zsag79 8

12/04/2024, 13:32

240412-qtbkfsdh4s 8

09/04/2024, 05:34

240409-f9mmjsbc9t 8

09/04/2024, 05:33

240409-f9bkaabc8w 8

09/04/2024, 05:33

240409-f86n2abc71 8

09/04/2024, 05:33

240409-f8wh3afh27 8

01/02/2024, 11:29

240201-nlq9tsebck 10

Analysis

  • max time kernel
    138s
  • max time network
    151s
  • platform
    windows10-1703_x64
  • resource
    win10-20231220-en
  • resource tags

    arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system
  • submitted
    23/01/2024, 14:03

General

  • Target

    svchost_dump_SCY - Copy.exe

  • Size

    5.2MB

  • MD5

    5fd3d21a968f4b8a1577b5405ab1c36a

  • SHA1

    710e5ab0fceb71b982b966c3a7406ebdf1d2aa82

  • SHA256

    7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f

  • SHA512

    085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f

  • SSDEEP

    98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs

Score
10/10

Malware Config

Signatures

  • Detects BazaLoader malware 6 IoCs

    BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.

  • Modifies Windows Firewall 1 TTPs 4 IoCs
  • Executes dropped EXE 1 IoCs
  • Drops file in Windows directory 4 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 14 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe
    "C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:4888
    • C:\Windows\System32\Wbem\WMIC.exe
      WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2704
    • C:\Windows\System32\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
      2⤵
      • Modifies Windows Firewall
      PID:168
    • C:\Windows\System32\netsh.exe
      "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
      2⤵
      • Modifies Windows Firewall
      PID:1748
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:2148
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3028
    • C:\Windows\SYSTEM32\schtasks.exe
      schtasks /delete /TN "Timer"
      2⤵
        PID:5076
      • C:\Windows\SYSTEM32\schtasks.exe
        schtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM
        2⤵
        • Creates scheduled task(s)
        PID:3884
      • C:\Windows\System\svchost.exe
        "C:\Windows\System\svchost.exe" formal
        2⤵
        • Executes dropped EXE
        • Drops file in Windows directory
        • Suspicious use of WriteProcessMemory
        PID:596
        • C:\Windows\System32\Wbem\WMIC.exe
          WMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName
          3⤵
            PID:1460
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes
            3⤵
            • Modifies Windows Firewall
            PID:2684
          • C:\Windows\System32\netsh.exe
            "C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes
            3⤵
            • Modifies Windows Firewall
            PID:2088
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:2184
          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
            "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \
            3⤵
            • Suspicious behavior: EnumeratesProcesses
            PID:428

      Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0\UsageLogs\powershell.exe.log

              Filesize

              2KB

              MD5

              268b890dae39e430e8b127909067ed96

              SHA1

              35939515965c0693ef46e021254c3e73ea8c4a2b

              SHA256

              7643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c

              SHA512

              abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              1eecdf947f7da295f59fc4d89b5d79c7

              SHA1

              5bda122547dc38753a94d5ffd182fa1807a59e5c

              SHA256

              e97cba0eb49d8cce3c6535c580d99cb9081938a4e71400f1544e77fc84f2f0d8

              SHA512

              f7860479b762c464c9fe3ca3fe50b40c65fec9b89028cf0fc000ac484ef7cd786af7038f3a401d9c2a419e4546327906806df5a66ca1661c3af016ca80fae868

            • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive

              Filesize

              1KB

              MD5

              be166ac2d24c3200a7307efbdc505950

              SHA1

              982f5d9b77895350a7ed77fe6b6aeb1140892cc5

              SHA256

              fa1135a9e7458237cd87b066bfa6416a30b6ca511ba96a50aee914e30cd5a632

              SHA512

              224437cefd78fbb678499367697ad54b23d5ef8f2c1593efb32bf521911176f788226946cebb9a66ab68a495b68a2e25f31f4a0dceb62c020f0dedd3a74b44e5

            • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_epy5j2yl.4ws.ps1

              Filesize

              1B

              MD5

              c4ca4238a0b923820dcc509a6f75849b

              SHA1

              356a192b7913b04c54574d18c28d46e6395428ab

              SHA256

              6b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b

              SHA512

              4dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdesc-consensus.tmp

              Filesize

              85KB

              MD5

              5620c2f1f9a6916d946e1198bff8b9cd

              SHA1

              d9fc06ef9d008f7d22b7e11bf4aacf3d37baacf3

              SHA256

              5863c9a62d7a4ad4cf7d1a18eef9d41a2e93ab309a5f451d622c7ba250f12f44

              SHA512

              ae66d2524895a7dfc02f931d9dd62944a58082c9bf3a17f37ebc4e5574dbce399438554c67bef3b3748b5fdbf7a0082a837bccb544d845f61f20da21bb6fbcf7

            • C:\Users\Admin\AppData\Roaming\tor\cached-microdescs.new

              Filesize

              466KB

              MD5

              b2a67775a11d216c2449bd4277861ede

              SHA1

              bcafeba7df1ee28d36012590a479145e380d9920

              SHA256

              00066e3afc259324922b4fa020e9ac5d7da479d196c0383bc13892653356cfda

              SHA512

              805b29c1561cbc5e6a2dc6e81f97da024e1f10edf47f1f4fc6cfb5009933644ba9285faabad8d4e0134dcd7b9f808e11c145f82297de4119988346b4fc417ca2

            • C:\Windows\System\svchost.exe

              Filesize

              2.0MB

              MD5

              1fb6a954c91c26d86144e381e3a5f952

              SHA1

              625fd8cc6315c6c4c0224a5924416dbf3daff585

              SHA256

              2e09a0602879168c7e395f80e5391ad29bb31497b194aef5498bc40a1336e9f4

              SHA512

              6f52a51314a7ed82977f26a9e93f526e3931a83a6b4d87f3950dbc77cd3ed6ee25b4d8e54a7ec387c9d031ea29e32290232daf56fc891d8b276e097d6b8cf914

            • C:\Windows\System\svchost.exe

              Filesize

              1.6MB

              MD5

              45c6324243337f6c4715784c11b96ff2

              SHA1

              98156bc22c5ec657abf8363044a7361d138242eb

              SHA256

              af41e99b8cf51005741b0c4cab801b104ebe1f854fe88b4c88f17528712f9788

              SHA512

              79bbe8b1ed0c195e93c5ff5b797b1622e3385ed5549ef276884930bd02ae365d861710930b637bd4efe8ea1fee9e649d341a2adf799e94dd2593069793ebd157

            • memory/428-140-0x0000022C64240000-0x0000022C64250000-memory.dmp

              Filesize

              64KB

            • memory/428-214-0x0000022C64240000-0x0000022C64250000-memory.dmp

              Filesize

              64KB

            • memory/428-139-0x0000022C64240000-0x0000022C64250000-memory.dmp

              Filesize

              64KB

            • memory/428-127-0x00007FF9A0CB0000-0x00007FF9A169C000-memory.dmp

              Filesize

              9.9MB

            • memory/428-177-0x0000022C64240000-0x0000022C64250000-memory.dmp

              Filesize

              64KB

            • memory/428-218-0x00007FF9A0CB0000-0x00007FF9A169C000-memory.dmp

              Filesize

              9.9MB

            • memory/596-147-0x0000000140000000-0x0000000140636000-memory.dmp

              Filesize

              6.2MB

            • memory/596-219-0x00000000369D0000-0x0000000036EB2000-memory.dmp

              Filesize

              4.9MB

            • memory/2148-7-0x000001EC26930000-0x000001EC26940000-memory.dmp

              Filesize

              64KB

            • memory/2148-6-0x000001EC26930000-0x000001EC26940000-memory.dmp

              Filesize

              64KB

            • memory/2148-109-0x00007FF9A1010000-0x00007FF9A19FC000-memory.dmp

              Filesize

              9.9MB

            • memory/2148-13-0x000001EC26970000-0x000001EC26992000-memory.dmp

              Filesize

              136KB

            • memory/2148-103-0x000001EC26930000-0x000001EC26940000-memory.dmp

              Filesize

              64KB

            • memory/2148-5-0x00007FF9A1010000-0x00007FF9A19FC000-memory.dmp

              Filesize

              9.9MB

            • memory/2148-48-0x000001EC26930000-0x000001EC26940000-memory.dmp

              Filesize

              64KB

            • memory/2148-19-0x000001EC26D50000-0x000001EC26DC6000-memory.dmp

              Filesize

              472KB

            • memory/2184-121-0x0000022869170000-0x0000022869180000-memory.dmp

              Filesize

              64KB

            • memory/2184-199-0x0000022869170000-0x0000022869180000-memory.dmp

              Filesize

              64KB

            • memory/2184-118-0x00007FF9A0CB0000-0x00007FF9A169C000-memory.dmp

              Filesize

              9.9MB

            • memory/2184-122-0x0000022869170000-0x0000022869180000-memory.dmp

              Filesize

              64KB

            • memory/2184-208-0x00007FF9A0CB0000-0x00007FF9A169C000-memory.dmp

              Filesize

              9.9MB

            • memory/2184-149-0x0000022869170000-0x0000022869180000-memory.dmp

              Filesize

              64KB

            • memory/3028-15-0x00000224001F0000-0x0000022400200000-memory.dmp

              Filesize

              64KB

            • memory/3028-10-0x00007FF9A1010000-0x00007FF9A19FC000-memory.dmp

              Filesize

              9.9MB

            • memory/3028-108-0x00007FF9A1010000-0x00007FF9A19FC000-memory.dmp

              Filesize

              9.9MB

            • memory/3028-14-0x00000224001F0000-0x0000022400200000-memory.dmp

              Filesize

              64KB

            • memory/3028-99-0x00000224001F0000-0x0000022400200000-memory.dmp

              Filesize

              64KB

            • memory/3028-53-0x00000224001F0000-0x0000022400200000-memory.dmp

              Filesize

              64KB

            • memory/4888-115-0x0000000140000000-0x0000000140636000-memory.dmp

              Filesize

              6.2MB

            • memory/4888-0-0x0000000140000000-0x0000000140636000-memory.dmp

              Filesize

              6.2MB

            • memory/4888-98-0x0000000140000000-0x0000000140636000-memory.dmp

              Filesize

              6.2MB