Resubmissions
12-04-2024 13:32
240412-qtgfpsag84 812-04-2024 13:32
240412-qtc4aaag83 812-04-2024 13:32
240412-qtcshsag82 812-04-2024 13:32
240412-qtb6zsag79 812-04-2024 13:32
240412-qtbkfsdh4s 809-04-2024 05:34
240409-f9mmjsbc9t 809-04-2024 05:33
240409-f9bkaabc8w 809-04-2024 05:33
240409-f86n2abc71 809-04-2024 05:33
240409-f8wh3afh27 801-02-2024 11:29
240201-nlq9tsebck 10Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-1703_x64 -
resource
win10-20231220-en -
resource tags
arch:x64arch:x86image:win10-20231220-enlocale:en-usos:windows10-1703-x64system -
submitted
01-02-2024 11:29
Behavioral task
behavioral1
Sample
svchost_dump_SCY - Copy.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
svchost_dump_SCY - Copy.exe
Resource
win10-20231220-en
Behavioral task
behavioral3
Sample
svchost_dump_SCY - Copy.exe
Resource
win10v2004-20231222-en
General
-
Target
svchost_dump_SCY - Copy.exe
-
Size
5.2MB
-
MD5
5fd3d21a968f4b8a1577b5405ab1c36a
-
SHA1
710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
-
SHA256
7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
-
SHA512
085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
SSDEEP
98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs
Malware Config
Signatures
-
Detects BazaLoader malware 7 IoCs
BazaLoader is a trojan that transmits logs to the Command and Control (C2) server, encoding them in BASE64 format through GET requests.
Processes:
resource yara_rule behavioral2/memory/352-0-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader behavioral2/memory/352-113-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader C:\Windows\System\svchost.exe BazaLoader behavioral2/memory/520-118-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader C:\Windows\System\svchost.exe BazaLoader behavioral2/memory/352-119-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader behavioral2/memory/520-204-0x0000000140000000-0x0000000140636000-memory.dmp BazaLoader -
Modifies Windows Firewall 2 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 4088 netsh.exe 3724 netsh.exe 4116 netsh.exe 2268 netsh.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 520 svchost.exe -
Drops file in Windows directory 4 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exedescription ioc process File created C:\Windows\System\xxx1.bak svchost_dump_SCY - Copy.exe File created C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File opened for modification C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File created C:\Windows\System\xxx1.bak svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
powershell.exepowershell.exesvchost_dump_SCY - Copy.exepowershell.exepowershell.exepid process 916 powershell.exe 916 powershell.exe 1452 powershell.exe 1452 powershell.exe 1452 powershell.exe 916 powershell.exe 352 svchost_dump_SCY - Copy.exe 352 svchost_dump_SCY - Copy.exe 3768 powershell.exe 3768 powershell.exe 3768 powershell.exe 2624 powershell.exe 2624 powershell.exe 2624 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exepowershell.exepowershell.exedescription pid process Token: SeIncreaseQuotaPrivilege 200 WMIC.exe Token: SeSecurityPrivilege 200 WMIC.exe Token: SeTakeOwnershipPrivilege 200 WMIC.exe Token: SeLoadDriverPrivilege 200 WMIC.exe Token: SeSystemProfilePrivilege 200 WMIC.exe Token: SeSystemtimePrivilege 200 WMIC.exe Token: SeProfSingleProcessPrivilege 200 WMIC.exe Token: SeIncBasePriorityPrivilege 200 WMIC.exe Token: SeCreatePagefilePrivilege 200 WMIC.exe Token: SeBackupPrivilege 200 WMIC.exe Token: SeRestorePrivilege 200 WMIC.exe Token: SeShutdownPrivilege 200 WMIC.exe Token: SeDebugPrivilege 200 WMIC.exe Token: SeSystemEnvironmentPrivilege 200 WMIC.exe Token: SeRemoteShutdownPrivilege 200 WMIC.exe Token: SeUndockPrivilege 200 WMIC.exe Token: SeManageVolumePrivilege 200 WMIC.exe Token: 33 200 WMIC.exe Token: 34 200 WMIC.exe Token: 35 200 WMIC.exe Token: 36 200 WMIC.exe Token: SeIncreaseQuotaPrivilege 200 WMIC.exe Token: SeSecurityPrivilege 200 WMIC.exe Token: SeTakeOwnershipPrivilege 200 WMIC.exe Token: SeLoadDriverPrivilege 200 WMIC.exe Token: SeSystemProfilePrivilege 200 WMIC.exe Token: SeSystemtimePrivilege 200 WMIC.exe Token: SeProfSingleProcessPrivilege 200 WMIC.exe Token: SeIncBasePriorityPrivilege 200 WMIC.exe Token: SeCreatePagefilePrivilege 200 WMIC.exe Token: SeBackupPrivilege 200 WMIC.exe Token: SeRestorePrivilege 200 WMIC.exe Token: SeShutdownPrivilege 200 WMIC.exe Token: SeDebugPrivilege 200 WMIC.exe Token: SeSystemEnvironmentPrivilege 200 WMIC.exe Token: SeRemoteShutdownPrivilege 200 WMIC.exe Token: SeUndockPrivilege 200 WMIC.exe Token: SeManageVolumePrivilege 200 WMIC.exe Token: 33 200 WMIC.exe Token: 34 200 WMIC.exe Token: 35 200 WMIC.exe Token: 36 200 WMIC.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeDebugPrivilege 1452 powershell.exe Token: SeIncreaseQuotaPrivilege 916 powershell.exe Token: SeSecurityPrivilege 916 powershell.exe Token: SeTakeOwnershipPrivilege 916 powershell.exe Token: SeLoadDriverPrivilege 916 powershell.exe Token: SeSystemProfilePrivilege 916 powershell.exe Token: SeSystemtimePrivilege 916 powershell.exe Token: SeProfSingleProcessPrivilege 916 powershell.exe Token: SeIncBasePriorityPrivilege 916 powershell.exe Token: SeCreatePagefilePrivilege 916 powershell.exe Token: SeBackupPrivilege 916 powershell.exe Token: SeRestorePrivilege 916 powershell.exe Token: SeShutdownPrivilege 916 powershell.exe Token: SeDebugPrivilege 916 powershell.exe Token: SeSystemEnvironmentPrivilege 916 powershell.exe Token: SeRemoteShutdownPrivilege 916 powershell.exe Token: SeUndockPrivilege 916 powershell.exe Token: SeManageVolumePrivilege 916 powershell.exe Token: 33 916 powershell.exe Token: 34 916 powershell.exe Token: 35 916 powershell.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exedescription pid process target process PID 352 wrote to memory of 200 352 svchost_dump_SCY - Copy.exe WMIC.exe PID 352 wrote to memory of 200 352 svchost_dump_SCY - Copy.exe WMIC.exe PID 352 wrote to memory of 4088 352 svchost_dump_SCY - Copy.exe netsh.exe PID 352 wrote to memory of 4088 352 svchost_dump_SCY - Copy.exe netsh.exe PID 352 wrote to memory of 3724 352 svchost_dump_SCY - Copy.exe netsh.exe PID 352 wrote to memory of 3724 352 svchost_dump_SCY - Copy.exe netsh.exe PID 352 wrote to memory of 916 352 svchost_dump_SCY - Copy.exe powershell.exe PID 352 wrote to memory of 916 352 svchost_dump_SCY - Copy.exe powershell.exe PID 352 wrote to memory of 1452 352 svchost_dump_SCY - Copy.exe powershell.exe PID 352 wrote to memory of 1452 352 svchost_dump_SCY - Copy.exe powershell.exe PID 352 wrote to memory of 1084 352 svchost_dump_SCY - Copy.exe schtasks.exe PID 352 wrote to memory of 1084 352 svchost_dump_SCY - Copy.exe schtasks.exe PID 352 wrote to memory of 2848 352 svchost_dump_SCY - Copy.exe schtasks.exe PID 352 wrote to memory of 2848 352 svchost_dump_SCY - Copy.exe schtasks.exe PID 352 wrote to memory of 520 352 svchost_dump_SCY - Copy.exe svchost.exe PID 352 wrote to memory of 520 352 svchost_dump_SCY - Copy.exe svchost.exe PID 520 wrote to memory of 5008 520 svchost.exe WMIC.exe PID 520 wrote to memory of 5008 520 svchost.exe WMIC.exe PID 520 wrote to memory of 2268 520 svchost.exe netsh.exe PID 520 wrote to memory of 2268 520 svchost.exe netsh.exe PID 520 wrote to memory of 4116 520 svchost.exe netsh.exe PID 520 wrote to memory of 4116 520 svchost.exe netsh.exe PID 520 wrote to memory of 3768 520 svchost.exe powershell.exe PID 520 wrote to memory of 3768 520 svchost.exe powershell.exe PID 520 wrote to memory of 2624 520 svchost.exe powershell.exe PID 520 wrote to memory of 2624 520 svchost.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"1⤵
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
- Suspicious use of AdjustPrivilegeToken
PID:200 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:4088 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:3724 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:916 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1452 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /delete /TN "Timer"2⤵PID:1084
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName3⤵PID:5008
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
PID:3768 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:4116 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2624 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:2268 -
C:\Windows\SYSTEM32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:2848
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5268b890dae39e430e8b127909067ed96
SHA135939515965c0693ef46e021254c3e73ea8c4a2b
SHA2567643d492a6f1e035b63b2e16c9c21d974a77dfd2d8e90b9c15ee412625e88c4c
SHA512abc4b2ce10a6566f38c00ad55e433791dd45fca47deec70178daf0763578ff019fb0ec70792d5e9ecde4eb6778a35ba8a8c7ecd07550597d9bbb13521c9b98fb
-
Filesize
1KB
MD5204aa71e32e977dbe10984fc8d6df62d
SHA1bf8120a05f5475bd2835f56d64a6b270f8b70b22
SHA2565b5bb82ffe764ffe7507e523cee292b2acdd7db44449a1c8b4373d91bc2341bc
SHA512bf882721a5ced6ba3f3e4daf77fe48f219fe0ae48e10a0bf30509449aece7601b67f7157b80f91516e9d24984facc61058eaf56817fa994dbf05a134cb2e264a
-
Filesize
1KB
MD53f78f8d8ce2924679c823b12b4d90e53
SHA1866afbec8d101b9d05bda56fe8116e965fc9a410
SHA2568913e9df4798d40cc8e6219fada6bf79582e1b6d356fbdaad20c8dc84a815caf
SHA512eb9d20b01d3750a591256be6b83a95012a85518f2932fdb7d3e9e3d11e05fa1e93e30fb0f210145d4574258f2d5cb3596abe19c5c60bfa07dd1a6a402ee93982
-
Filesize
1B
MD5c4ca4238a0b923820dcc509a6f75849b
SHA1356a192b7913b04c54574d18c28d46e6395428ab
SHA2566b86b273ff34fce19d6b804eff5a3f5747ada4eaa22f1d49c01e52ddb7875b4b
SHA5124dff4ea340f0a823f15d3f4f01ab62eae0e5da579ccb851f8db9dfe84c58b2b37b89903a740e1ee172da793a6e79d560e5f7f9bd058a12a280433ed6fa46510a
-
Filesize
576KB
MD5e835b96012a08bf33ac69afe278e01e1
SHA1e0d4d4acb7fdf38268f4442cceb155fec580a1c2
SHA256642d913810363c97b562c31bbc329ed448db7076b973c66c9ed8d582e9fa2258
SHA51206f8efe9d5e5184d68aa9056662b2c90f8d8b5bc4cd6f98b2174d348e17800f3d481cdec024775ca3f91b2de31161d77f9e0f107915bfe2113dd03cc4c7c9342
-
Filesize
1.1MB
MD5ff22ef978794626b48921938fa9ad5d5
SHA1db2d90f99834047d2ee79069dff0c3c9f60be50f
SHA256b5f54b6414f1e986ce00b7a72297203d40b24c330538c56ab08bc31aa5c948a0
SHA51221a97834b2857002c8d1f57463a25de0785f2f451b0c6f01c32b4b5efa7fd084cbd9b38e661c978629e4b8da8e71a588f17aca6835e949904adb32e98404862d
-
Filesize
498KB
MD5e2e3a89fcbd45696b9647f9f8d1bb9e8
SHA161d4225a7eeb64c72cba365c873c34664c0e6a2f
SHA2562652125c030a2d9f442cb57054ff520ebf6c049034342a5cef03767748742faa
SHA512f39125358fa4fed1d1b400a105332b57fbdc8dc78e23a4aabb8fcf8938bb27a2f29d38e99db203197d81a787693b7d6cb775c1a0d4ab949c8b226df0508e17ae
-
Filesize
490KB
MD5b990693b53a03b781feaa9d4a2f7e199
SHA1df508f5d7d3dfe5f1863492fd741c77162108bbd
SHA25636cba39253bb837de0cee057326e2992b5fe2bd975016d3410792baa4054381f
SHA5120f00e2b5795d988d059c0b224ea86d652846bcce3ab0df1719c351051f349dc153ab6a63962bb25a34e238300f2bad15ea4ef96c1afd97cc708f480711acaef1