Resubmissions
12-04-2024 13:32
240412-qtgfpsag84 812-04-2024 13:32
240412-qtc4aaag83 812-04-2024 13:32
240412-qtcshsag82 812-04-2024 13:32
240412-qtb6zsag79 812-04-2024 13:32
240412-qtbkfsdh4s 809-04-2024 05:34
240409-f9mmjsbc9t 809-04-2024 05:33
240409-f9bkaabc8w 809-04-2024 05:33
240409-f86n2abc71 809-04-2024 05:33
240409-f8wh3afh27 801-02-2024 11:29
240201-nlq9tsebck 10Analysis
-
max time kernel
275s -
max time network
301s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
09-04-2024 05:33
Static task
static1
Behavioral task
behavioral1
Sample
svchost_dump_SCY - Copy.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
svchost_dump_SCY - Copy.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
svchost_dump_SCY - Copy.exe
Resource
win10v2004-20240226-en
Behavioral task
behavioral4
Sample
svchost_dump_SCY - Copy.exe
Resource
win11-20240221-en
General
-
Target
svchost_dump_SCY - Copy.exe
-
Size
5.2MB
-
MD5
5fd3d21a968f4b8a1577b5405ab1c36a
-
SHA1
710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
-
SHA256
7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
-
SHA512
085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
SSDEEP
98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 4 IoCs
pid Process 1084 netsh.exe 2360 netsh.exe 2800 netsh.exe 2692 netsh.exe -
Executes dropped EXE 1 IoCs
pid Process 944 svchost.exe -
Loads dropped DLL 2 IoCs
pid Process 2328 svchost_dump_SCY - Copy.exe 2328 svchost_dump_SCY - Copy.exe -
Drops file in Windows directory 4 IoCs
description ioc Process File created C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File opened for modification C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File created C:\Windows\System\xxx1.bak svchost.exe File created C:\Windows\System\xxx1.bak svchost_dump_SCY - Copy.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2260 powershell.exe 2596 powershell.exe 2328 svchost_dump_SCY - Copy.exe 2008 powershell.exe 1836 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 2944 WMIC.exe Token: SeSecurityPrivilege 2944 WMIC.exe Token: SeTakeOwnershipPrivilege 2944 WMIC.exe Token: SeLoadDriverPrivilege 2944 WMIC.exe Token: SeSystemProfilePrivilege 2944 WMIC.exe Token: SeSystemtimePrivilege 2944 WMIC.exe Token: SeProfSingleProcessPrivilege 2944 WMIC.exe Token: SeIncBasePriorityPrivilege 2944 WMIC.exe Token: SeCreatePagefilePrivilege 2944 WMIC.exe Token: SeBackupPrivilege 2944 WMIC.exe Token: SeRestorePrivilege 2944 WMIC.exe Token: SeShutdownPrivilege 2944 WMIC.exe Token: SeDebugPrivilege 2944 WMIC.exe Token: SeSystemEnvironmentPrivilege 2944 WMIC.exe Token: SeRemoteShutdownPrivilege 2944 WMIC.exe Token: SeUndockPrivilege 2944 WMIC.exe Token: SeManageVolumePrivilege 2944 WMIC.exe Token: 33 2944 WMIC.exe Token: 34 2944 WMIC.exe Token: 35 2944 WMIC.exe Token: SeIncreaseQuotaPrivilege 2944 WMIC.exe Token: SeSecurityPrivilege 2944 WMIC.exe Token: SeTakeOwnershipPrivilege 2944 WMIC.exe Token: SeLoadDriverPrivilege 2944 WMIC.exe Token: SeSystemProfilePrivilege 2944 WMIC.exe Token: SeSystemtimePrivilege 2944 WMIC.exe Token: SeProfSingleProcessPrivilege 2944 WMIC.exe Token: SeIncBasePriorityPrivilege 2944 WMIC.exe Token: SeCreatePagefilePrivilege 2944 WMIC.exe Token: SeBackupPrivilege 2944 WMIC.exe Token: SeRestorePrivilege 2944 WMIC.exe Token: SeShutdownPrivilege 2944 WMIC.exe Token: SeDebugPrivilege 2944 WMIC.exe Token: SeSystemEnvironmentPrivilege 2944 WMIC.exe Token: SeRemoteShutdownPrivilege 2944 WMIC.exe Token: SeUndockPrivilege 2944 WMIC.exe Token: SeManageVolumePrivilege 2944 WMIC.exe Token: 33 2944 WMIC.exe Token: 34 2944 WMIC.exe Token: 35 2944 WMIC.exe Token: SeDebugPrivilege 2260 powershell.exe Token: SeDebugPrivilege 2596 powershell.exe Token: SeIncreaseQuotaPrivilege 1448 WMIC.exe Token: SeSecurityPrivilege 1448 WMIC.exe Token: SeTakeOwnershipPrivilege 1448 WMIC.exe Token: SeLoadDriverPrivilege 1448 WMIC.exe Token: SeSystemProfilePrivilege 1448 WMIC.exe Token: SeSystemtimePrivilege 1448 WMIC.exe Token: SeProfSingleProcessPrivilege 1448 WMIC.exe Token: SeIncBasePriorityPrivilege 1448 WMIC.exe Token: SeCreatePagefilePrivilege 1448 WMIC.exe Token: SeBackupPrivilege 1448 WMIC.exe Token: SeRestorePrivilege 1448 WMIC.exe Token: SeShutdownPrivilege 1448 WMIC.exe Token: SeDebugPrivilege 1448 WMIC.exe Token: SeSystemEnvironmentPrivilege 1448 WMIC.exe Token: SeRemoteShutdownPrivilege 1448 WMIC.exe Token: SeUndockPrivilege 1448 WMIC.exe Token: SeManageVolumePrivilege 1448 WMIC.exe Token: 33 1448 WMIC.exe Token: 34 1448 WMIC.exe Token: 35 1448 WMIC.exe Token: SeIncreaseQuotaPrivilege 1448 WMIC.exe Token: SeSecurityPrivilege 1448 WMIC.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 2328 wrote to memory of 2944 2328 svchost_dump_SCY - Copy.exe 29 PID 2328 wrote to memory of 2944 2328 svchost_dump_SCY - Copy.exe 29 PID 2328 wrote to memory of 2944 2328 svchost_dump_SCY - Copy.exe 29 PID 2328 wrote to memory of 2800 2328 svchost_dump_SCY - Copy.exe 31 PID 2328 wrote to memory of 2800 2328 svchost_dump_SCY - Copy.exe 31 PID 2328 wrote to memory of 2800 2328 svchost_dump_SCY - Copy.exe 31 PID 2328 wrote to memory of 2692 2328 svchost_dump_SCY - Copy.exe 33 PID 2328 wrote to memory of 2692 2328 svchost_dump_SCY - Copy.exe 33 PID 2328 wrote to memory of 2692 2328 svchost_dump_SCY - Copy.exe 33 PID 2328 wrote to memory of 2260 2328 svchost_dump_SCY - Copy.exe 35 PID 2328 wrote to memory of 2260 2328 svchost_dump_SCY - Copy.exe 35 PID 2328 wrote to memory of 2260 2328 svchost_dump_SCY - Copy.exe 35 PID 2328 wrote to memory of 2596 2328 svchost_dump_SCY - Copy.exe 37 PID 2328 wrote to memory of 2596 2328 svchost_dump_SCY - Copy.exe 37 PID 2328 wrote to memory of 2596 2328 svchost_dump_SCY - Copy.exe 37 PID 2328 wrote to memory of 924 2328 svchost_dump_SCY - Copy.exe 39 PID 2328 wrote to memory of 924 2328 svchost_dump_SCY - Copy.exe 39 PID 2328 wrote to memory of 924 2328 svchost_dump_SCY - Copy.exe 39 PID 2328 wrote to memory of 2308 2328 svchost_dump_SCY - Copy.exe 41 PID 2328 wrote to memory of 2308 2328 svchost_dump_SCY - Copy.exe 41 PID 2328 wrote to memory of 2308 2328 svchost_dump_SCY - Copy.exe 41 PID 2328 wrote to memory of 944 2328 svchost_dump_SCY - Copy.exe 43 PID 2328 wrote to memory of 944 2328 svchost_dump_SCY - Copy.exe 43 PID 2328 wrote to memory of 944 2328 svchost_dump_SCY - Copy.exe 43 PID 944 wrote to memory of 1448 944 svchost.exe 45 PID 944 wrote to memory of 1448 944 svchost.exe 45 PID 944 wrote to memory of 1448 944 svchost.exe 45 PID 944 wrote to memory of 1084 944 svchost.exe 47 PID 944 wrote to memory of 1084 944 svchost.exe 47 PID 944 wrote to memory of 1084 944 svchost.exe 47 PID 944 wrote to memory of 2360 944 svchost.exe 49 PID 944 wrote to memory of 2360 944 svchost.exe 49 PID 944 wrote to memory of 2360 944 svchost.exe 49 PID 944 wrote to memory of 2008 944 svchost.exe 51 PID 944 wrote to memory of 2008 944 svchost.exe 51 PID 944 wrote to memory of 2008 944 svchost.exe 51 PID 944 wrote to memory of 1836 944 svchost.exe 53 PID 944 wrote to memory of 1836 944 svchost.exe 53 PID 944 wrote to memory of 1836 944 svchost.exe 53 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2328 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2944
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2800
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2692
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2260
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2596
-
-
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"2⤵PID:924
-
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:2308
-
-
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1448
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:1084
-
-
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:2360
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2008
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1836
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD506f115459e4fa530989aaea221550a97
SHA1bc025f3859373e3a674b1831af4cc5ef35cd59ce
SHA2564a944298f7cd093e082bfb210524d1831974751a453b0c17abdccd80f865f65f
SHA512ef1df74c90b22be28e104a83ab7f93e03440d56506a70cbd18e93000db784421edc58d468ec97612b365cd683b65b8e1fe6aa9f4f4693bdaf27f6794fb44f402
-
Filesize
2.7MB
MD5277abb67ec3376d7c576732a62c39916
SHA170faa899ea7c8618289668813f04c69613fd6995
SHA25662ce6ee974509a141b66d66c4dfe41565f9ba90f3d62cd286d7a08834f2b10d4
SHA512f385313c49f7b153488f12be7ea04ed5c1220a85b7dc1382dcb862b8d5b155c5999971d3e8c7b37abdfcf8c2ff23f971a0a477a24f23ff8d08e2bcbe90f5021b
-
Filesize
14.8MB
MD55d6be28658fdb01fc091080423662dea
SHA19383367722466034c00dcdca9643a35234b68a64
SHA256d5e49a55468e2aab3f1fa8a44af938566494eede12a4c21944ab9fe6d71a03fb
SHA512be15ae2cb866edbd3d3fca50e774f4bb03352b93b555a55606da2ac66497781d91f3c5b6e184136ea31bc805e7c851d188c527c4d6753fefa8f90f6901e378ba
-
Filesize
5.2MB
MD55fd3d21a968f4b8a1577b5405ab1c36a
SHA1710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
SHA2567ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
SHA512085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f