Analysis
-
max time kernel
114s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
23-01-2024 14:03
Behavioral task
behavioral1
Sample
svchost_dump_SCY - Copy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
svchost_dump_SCY - Copy.exe
Resource
win10-20231215-en
Behavioral task
behavioral3
Sample
svchost_dump_SCY - Copy.exe
Resource
win10v2004-20231215-en
General
-
Target
svchost_dump_SCY - Copy.exe
-
Size
5.2MB
-
MD5
5fd3d21a968f4b8a1577b5405ab1c36a
-
SHA1
710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
-
SHA256
7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
-
SHA512
085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
SSDEEP
98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs
Malware Config
Signatures
-
Detects BazaLoader malware 8 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral3/memory/3288-0-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader behavioral3/memory/3288-34-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader C:\Windows\System\svchost.exe BazaLoader behavioral3/memory/1140-42-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader C:\Windows\System\svchost.exe BazaLoader C:\Windows\System\svchost.exe BazaLoader behavioral3/memory/3288-43-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader behavioral3/memory/1140-74-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader -
Modifies Windows Firewall 1 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 3932 netsh.exe 4796 netsh.exe 3320 netsh.exe 4800 netsh.exe -
Checks computer location settings 2 TTPs 2 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
svchost.exesvchost_dump_SCY - Copy.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost.exe Key value queried \REGISTRY\USER\S-1-5-21-3791175113-1062217823-1177695025-1000\Control Panel\International\Geo\Nation svchost_dump_SCY - Copy.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1140 svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exedescription ioc process File created C:\Windows\System\xxx1.bak svchost_dump_SCY - Copy.exe File created C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File opened for modification C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File created C:\Windows\System\xxx1.bak svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exesvchost_dump_SCY - Copy.exepowershell.exepowershell.exepid process 2352 powershell.exe 2352 powershell.exe 736 powershell.exe 736 powershell.exe 2352 powershell.exe 736 powershell.exe 3288 svchost_dump_SCY - Copy.exe 3288 svchost_dump_SCY - Copy.exe 4452 powershell.exe 4452 powershell.exe 4452 powershell.exe 4968 powershell.exe 4968 powershell.exe 4968 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exepowershell.exepowershell.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2848 WMIC.exe Token: SeSecurityPrivilege 2848 WMIC.exe Token: SeTakeOwnershipPrivilege 2848 WMIC.exe Token: SeLoadDriverPrivilege 2848 WMIC.exe Token: SeSystemProfilePrivilege 2848 WMIC.exe Token: SeSystemtimePrivilege 2848 WMIC.exe Token: SeProfSingleProcessPrivilege 2848 WMIC.exe Token: SeIncBasePriorityPrivilege 2848 WMIC.exe Token: SeCreatePagefilePrivilege 2848 WMIC.exe Token: SeBackupPrivilege 2848 WMIC.exe Token: SeRestorePrivilege 2848 WMIC.exe Token: SeShutdownPrivilege 2848 WMIC.exe Token: SeDebugPrivilege 2848 WMIC.exe Token: SeSystemEnvironmentPrivilege 2848 WMIC.exe Token: SeRemoteShutdownPrivilege 2848 WMIC.exe Token: SeUndockPrivilege 2848 WMIC.exe Token: SeManageVolumePrivilege 2848 WMIC.exe Token: 33 2848 WMIC.exe Token: 34 2848 WMIC.exe Token: 35 2848 WMIC.exe Token: 36 2848 WMIC.exe Token: SeIncreaseQuotaPrivilege 2848 WMIC.exe Token: SeSecurityPrivilege 2848 WMIC.exe Token: SeTakeOwnershipPrivilege 2848 WMIC.exe Token: SeLoadDriverPrivilege 2848 WMIC.exe Token: SeSystemProfilePrivilege 2848 WMIC.exe Token: SeSystemtimePrivilege 2848 WMIC.exe Token: SeProfSingleProcessPrivilege 2848 WMIC.exe Token: SeIncBasePriorityPrivilege 2848 WMIC.exe Token: SeCreatePagefilePrivilege 2848 WMIC.exe Token: SeBackupPrivilege 2848 WMIC.exe Token: SeRestorePrivilege 2848 WMIC.exe Token: SeShutdownPrivilege 2848 WMIC.exe Token: SeDebugPrivilege 2848 WMIC.exe Token: SeSystemEnvironmentPrivilege 2848 WMIC.exe Token: SeRemoteShutdownPrivilege 2848 WMIC.exe Token: SeUndockPrivilege 2848 WMIC.exe Token: SeManageVolumePrivilege 2848 WMIC.exe Token: 33 2848 WMIC.exe Token: 34 2848 WMIC.exe Token: 35 2848 WMIC.exe Token: 36 2848 WMIC.exe Token: SeDebugPrivilege 2352 powershell.exe Token: SeDebugPrivilege 736 powershell.exe Token: SeIncreaseQuotaPrivilege 2616 WMIC.exe Token: SeSecurityPrivilege 2616 WMIC.exe Token: SeTakeOwnershipPrivilege 2616 WMIC.exe Token: SeLoadDriverPrivilege 2616 WMIC.exe Token: SeSystemProfilePrivilege 2616 WMIC.exe Token: SeSystemtimePrivilege 2616 WMIC.exe Token: SeProfSingleProcessPrivilege 2616 WMIC.exe Token: SeIncBasePriorityPrivilege 2616 WMIC.exe Token: SeCreatePagefilePrivilege 2616 WMIC.exe Token: SeBackupPrivilege 2616 WMIC.exe Token: SeRestorePrivilege 2616 WMIC.exe Token: SeShutdownPrivilege 2616 WMIC.exe Token: SeDebugPrivilege 2616 WMIC.exe Token: SeSystemEnvironmentPrivilege 2616 WMIC.exe Token: SeRemoteShutdownPrivilege 2616 WMIC.exe Token: SeUndockPrivilege 2616 WMIC.exe Token: SeManageVolumePrivilege 2616 WMIC.exe Token: 33 2616 WMIC.exe Token: 34 2616 WMIC.exe Token: 35 2616 WMIC.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exedescription pid process target process PID 3288 wrote to memory of 2848 3288 svchost_dump_SCY - Copy.exe WMIC.exe PID 3288 wrote to memory of 2848 3288 svchost_dump_SCY - Copy.exe WMIC.exe PID 3288 wrote to memory of 3932 3288 svchost_dump_SCY - Copy.exe netsh.exe PID 3288 wrote to memory of 3932 3288 svchost_dump_SCY - Copy.exe netsh.exe PID 3288 wrote to memory of 4796 3288 svchost_dump_SCY - Copy.exe netsh.exe PID 3288 wrote to memory of 4796 3288 svchost_dump_SCY - Copy.exe netsh.exe PID 3288 wrote to memory of 2352 3288 svchost_dump_SCY - Copy.exe powershell.exe PID 3288 wrote to memory of 2352 3288 svchost_dump_SCY - Copy.exe powershell.exe PID 3288 wrote to memory of 736 3288 svchost_dump_SCY - Copy.exe powershell.exe PID 3288 wrote to memory of 736 3288 svchost_dump_SCY - Copy.exe powershell.exe PID 3288 wrote to memory of 4844 3288 svchost_dump_SCY - Copy.exe schtasks.exe PID 3288 wrote to memory of 4844 3288 svchost_dump_SCY - Copy.exe schtasks.exe PID 3288 wrote to memory of 1060 3288 svchost_dump_SCY - Copy.exe schtasks.exe PID 3288 wrote to memory of 1060 3288 svchost_dump_SCY - Copy.exe schtasks.exe PID 3288 wrote to memory of 1140 3288 svchost_dump_SCY - Copy.exe svchost.exe PID 3288 wrote to memory of 1140 3288 svchost_dump_SCY - Copy.exe svchost.exe PID 1140 wrote to memory of 2616 1140 svchost.exe WMIC.exe PID 1140 wrote to memory of 2616 1140 svchost.exe WMIC.exe PID 1140 wrote to memory of 4800 1140 svchost.exe netsh.exe PID 1140 wrote to memory of 4800 1140 svchost.exe netsh.exe PID 1140 wrote to memory of 3320 1140 svchost.exe netsh.exe PID 1140 wrote to memory of 3320 1140 svchost.exe netsh.exe PID 1140 wrote to memory of 4452 1140 svchost.exe powershell.exe PID 1140 wrote to memory of 4452 1140 svchost.exe powershell.exe PID 1140 wrote to memory of 4968 1140 svchost.exe powershell.exe PID 1140 wrote to memory of 4968 1140 svchost.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"1⤵
- Checks computer location settings
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2848 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3932 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:4796 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2352 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:736 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"2⤵PID:4844
-
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:1060 -
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Checks computer location settings
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1140 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2616 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4452 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:3320 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
PID:4968 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:4800
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD55c8ea9d884103d067a1ba2e422a2b1ed
SHA13ddf0f71f84e1b595b6f8862c649445a6d188ed6
SHA256d77147b11db5fdb60f2a0a1157944a3a59d713ff9996be33bd05d1e92fb2c28b
SHA5128366f4756c2390a631d7083b03b40a335cd05ae5c302fe3512919200ac4980e8c6b94e2e9ce634ab75f6bfa06a851a23b29e43afef3ad58b1b70d3d6bc569aca
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
896KB
MD53ed544f2467568e466a5b539c4012277
SHA17b12ba54a9976b946938d39af59b00d9ac81ee73
SHA25673d5988dbc0460020697af3fd3e3e8aa73a9ade41b55eca9673b0f1ccabe320d
SHA5121a85ed29211a925c91e5f4114979d954a594bc07e8a50ba4262dbd4e4a4446d00e92fbd6e134721ee288f65779a3448ce57bd0ffd87a049633860c849ae22674
-
Filesize
1.5MB
MD5d9961c5ad2af4e6326ab6cca1624d4a0
SHA157ce7f6b824254cdd83cc9536b0efec93a29ecb0
SHA256edaccb1579e856cb48bee5f88bc3cb86e9a9b3f2e88b0b0b721d25a31ad29b86
SHA512f761fbb4c031310d31d700c9348be3e97c90344644072fc3feb19c7698ad31d21a4817ddf02b7124530754a067e7c6cd5793024bf03ac15df4d65763baa3a5be
-
Filesize
386KB
MD554a91839f09af5db0ca7a29b7213a426
SHA1c4171686bf0ba66e58db104d8d862017314732d7
SHA2564210e5898d0deff6e8225cdd9fe48e35eee14006a5cdb405f8f5fa30539ba688
SHA5129033168b652b475436f91a1e1497cc7b36123ff32e18a062ecb758020e5fe58cb0f8d364d66c8735c82ba886be43f81c8a2d8e9dfe31d0b6e99bf2c01d6e136c
-
Filesize
500KB
MD5ec8a48d8145a05ecebab16087e7ca1e8
SHA1fa5598653b89c284eb807ad03381d0505a01b27d
SHA256ddb8f7a8c37033665ae31c47d05ef9f88491916300b6de5e20465b359f280107
SHA5123ad6f8797dfe2257e857ed8803fe60a94122be8fba0bd3df2b4c65b47ed8dd73df5df94ce2d090ab04c0b49be8f47c5d0bfca636e7dd7662af969aa37ce4addb
-
Filesize
298KB
MD5464e56584633af02d42497dff60a49ba
SHA103aa1e961aeb21393ddcc985e07a90571ebfc277
SHA256a280832fd60acbdbb4e295796eb1dbb00b7a173c477a7cb80ff1cae7842cd948
SHA5128ac8256ea2e2503b02314bf57307c685e56bb583a29c6eced19a05e3a3db3e0c95daebc10265d14ee6644df6b2e92ba20f4806cbf92d1c120830e870b695e9a7