Resubmissions
12-04-2024 13:32
240412-qtgfpsag84 812-04-2024 13:32
240412-qtc4aaag83 812-04-2024 13:32
240412-qtcshsag82 812-04-2024 13:32
240412-qtb6zsag79 812-04-2024 13:32
240412-qtbkfsdh4s 809-04-2024 05:34
240409-f9mmjsbc9t 809-04-2024 05:33
240409-f9bkaabc8w 809-04-2024 05:33
240409-f86n2abc71 809-04-2024 05:33
240409-f8wh3afh27 801-02-2024 11:29
240201-nlq9tsebck 10Analysis
-
max time kernel
150s -
max time network
157s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
12-04-2024 13:32
Static task
static1
Behavioral task
behavioral1
Sample
svchost_dump_SCY - Copy.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
svchost_dump_SCY - Copy.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
svchost_dump_SCY - Copy.exe
Resource
win10v2004-20240412-en
Behavioral task
behavioral4
Sample
svchost_dump_SCY - Copy.exe
Resource
win11-20240221-en
General
-
Target
svchost_dump_SCY - Copy.exe
-
Size
5.2MB
-
MD5
5fd3d21a968f4b8a1577b5405ab1c36a
-
SHA1
710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
-
SHA256
7ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
-
SHA512
085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f
-
SSDEEP
98304:jgoX+R+gW1CkQFBAFGspWvuL136BRiGQiiyBrDbnh57cpbJLyns:coXxFGWL56BVrDbn77cjIs
Malware Config
Signatures
-
Modifies Windows Firewall 2 TTPs 4 IoCs
Processes:
netsh.exenetsh.exenetsh.exenetsh.exepid process 2804 netsh.exe 2876 netsh.exe 2128 netsh.exe 2452 netsh.exe -
Executes dropped EXE 1 IoCs
Processes:
svchost.exepid process 1820 svchost.exe -
Loads dropped DLL 2 IoCs
Processes:
svchost_dump_SCY - Copy.exepid process 1392 svchost_dump_SCY - Copy.exe 1392 svchost_dump_SCY - Copy.exe -
Unexpected DNS network traffic destination 1 IoCs
Network traffic to other servers than the configured DNS servers was detected on the DNS port.
Processes:
description ioc Destination IP 62.102.148.68 -
Drops file in Windows directory 4 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exedescription ioc process File created C:\Windows\System\xxx1.bak svchost_dump_SCY - Copy.exe File created C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File opened for modification C:\Windows\System\svchost.exe svchost_dump_SCY - Copy.exe File created C:\Windows\System\xxx1.bak svchost.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 5 IoCs
Processes:
powershell.exepowershell.exesvchost_dump_SCY - Copy.exepowershell.exepowershell.exepid process 2660 powershell.exe 2480 powershell.exe 1392 svchost_dump_SCY - Copy.exe 2840 powershell.exe 1964 powershell.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
WMIC.exepowershell.exepowershell.exeWMIC.exedescription pid process Token: SeIncreaseQuotaPrivilege 2572 WMIC.exe Token: SeSecurityPrivilege 2572 WMIC.exe Token: SeTakeOwnershipPrivilege 2572 WMIC.exe Token: SeLoadDriverPrivilege 2572 WMIC.exe Token: SeSystemProfilePrivilege 2572 WMIC.exe Token: SeSystemtimePrivilege 2572 WMIC.exe Token: SeProfSingleProcessPrivilege 2572 WMIC.exe Token: SeIncBasePriorityPrivilege 2572 WMIC.exe Token: SeCreatePagefilePrivilege 2572 WMIC.exe Token: SeBackupPrivilege 2572 WMIC.exe Token: SeRestorePrivilege 2572 WMIC.exe Token: SeShutdownPrivilege 2572 WMIC.exe Token: SeDebugPrivilege 2572 WMIC.exe Token: SeSystemEnvironmentPrivilege 2572 WMIC.exe Token: SeRemoteShutdownPrivilege 2572 WMIC.exe Token: SeUndockPrivilege 2572 WMIC.exe Token: SeManageVolumePrivilege 2572 WMIC.exe Token: 33 2572 WMIC.exe Token: 34 2572 WMIC.exe Token: 35 2572 WMIC.exe Token: SeIncreaseQuotaPrivilege 2572 WMIC.exe Token: SeSecurityPrivilege 2572 WMIC.exe Token: SeTakeOwnershipPrivilege 2572 WMIC.exe Token: SeLoadDriverPrivilege 2572 WMIC.exe Token: SeSystemProfilePrivilege 2572 WMIC.exe Token: SeSystemtimePrivilege 2572 WMIC.exe Token: SeProfSingleProcessPrivilege 2572 WMIC.exe Token: SeIncBasePriorityPrivilege 2572 WMIC.exe Token: SeCreatePagefilePrivilege 2572 WMIC.exe Token: SeBackupPrivilege 2572 WMIC.exe Token: SeRestorePrivilege 2572 WMIC.exe Token: SeShutdownPrivilege 2572 WMIC.exe Token: SeDebugPrivilege 2572 WMIC.exe Token: SeSystemEnvironmentPrivilege 2572 WMIC.exe Token: SeRemoteShutdownPrivilege 2572 WMIC.exe Token: SeUndockPrivilege 2572 WMIC.exe Token: SeManageVolumePrivilege 2572 WMIC.exe Token: 33 2572 WMIC.exe Token: 34 2572 WMIC.exe Token: 35 2572 WMIC.exe Token: SeDebugPrivilege 2660 powershell.exe Token: SeDebugPrivilege 2480 powershell.exe Token: SeIncreaseQuotaPrivilege 1640 WMIC.exe Token: SeSecurityPrivilege 1640 WMIC.exe Token: SeTakeOwnershipPrivilege 1640 WMIC.exe Token: SeLoadDriverPrivilege 1640 WMIC.exe Token: SeSystemProfilePrivilege 1640 WMIC.exe Token: SeSystemtimePrivilege 1640 WMIC.exe Token: SeProfSingleProcessPrivilege 1640 WMIC.exe Token: SeIncBasePriorityPrivilege 1640 WMIC.exe Token: SeCreatePagefilePrivilege 1640 WMIC.exe Token: SeBackupPrivilege 1640 WMIC.exe Token: SeRestorePrivilege 1640 WMIC.exe Token: SeShutdownPrivilege 1640 WMIC.exe Token: SeDebugPrivilege 1640 WMIC.exe Token: SeSystemEnvironmentPrivilege 1640 WMIC.exe Token: SeRemoteShutdownPrivilege 1640 WMIC.exe Token: SeUndockPrivilege 1640 WMIC.exe Token: SeManageVolumePrivilege 1640 WMIC.exe Token: 33 1640 WMIC.exe Token: 34 1640 WMIC.exe Token: 35 1640 WMIC.exe Token: SeIncreaseQuotaPrivilege 1640 WMIC.exe Token: SeSecurityPrivilege 1640 WMIC.exe -
Suspicious use of WriteProcessMemory 39 IoCs
Processes:
svchost_dump_SCY - Copy.exesvchost.exedescription pid process target process PID 1392 wrote to memory of 2572 1392 svchost_dump_SCY - Copy.exe WMIC.exe PID 1392 wrote to memory of 2572 1392 svchost_dump_SCY - Copy.exe WMIC.exe PID 1392 wrote to memory of 2572 1392 svchost_dump_SCY - Copy.exe WMIC.exe PID 1392 wrote to memory of 2452 1392 svchost_dump_SCY - Copy.exe netsh.exe PID 1392 wrote to memory of 2452 1392 svchost_dump_SCY - Copy.exe netsh.exe PID 1392 wrote to memory of 2452 1392 svchost_dump_SCY - Copy.exe netsh.exe PID 1392 wrote to memory of 2804 1392 svchost_dump_SCY - Copy.exe netsh.exe PID 1392 wrote to memory of 2804 1392 svchost_dump_SCY - Copy.exe netsh.exe PID 1392 wrote to memory of 2804 1392 svchost_dump_SCY - Copy.exe netsh.exe PID 1392 wrote to memory of 2660 1392 svchost_dump_SCY - Copy.exe powershell.exe PID 1392 wrote to memory of 2660 1392 svchost_dump_SCY - Copy.exe powershell.exe PID 1392 wrote to memory of 2660 1392 svchost_dump_SCY - Copy.exe powershell.exe PID 1392 wrote to memory of 2480 1392 svchost_dump_SCY - Copy.exe powershell.exe PID 1392 wrote to memory of 2480 1392 svchost_dump_SCY - Copy.exe powershell.exe PID 1392 wrote to memory of 2480 1392 svchost_dump_SCY - Copy.exe powershell.exe PID 1392 wrote to memory of 2916 1392 svchost_dump_SCY - Copy.exe schtasks.exe PID 1392 wrote to memory of 2916 1392 svchost_dump_SCY - Copy.exe schtasks.exe PID 1392 wrote to memory of 2916 1392 svchost_dump_SCY - Copy.exe schtasks.exe PID 1392 wrote to memory of 2256 1392 svchost_dump_SCY - Copy.exe schtasks.exe PID 1392 wrote to memory of 2256 1392 svchost_dump_SCY - Copy.exe schtasks.exe PID 1392 wrote to memory of 2256 1392 svchost_dump_SCY - Copy.exe schtasks.exe PID 1392 wrote to memory of 1820 1392 svchost_dump_SCY - Copy.exe svchost.exe PID 1392 wrote to memory of 1820 1392 svchost_dump_SCY - Copy.exe svchost.exe PID 1392 wrote to memory of 1820 1392 svchost_dump_SCY - Copy.exe svchost.exe PID 1820 wrote to memory of 1640 1820 svchost.exe WMIC.exe PID 1820 wrote to memory of 1640 1820 svchost.exe WMIC.exe PID 1820 wrote to memory of 1640 1820 svchost.exe WMIC.exe PID 1820 wrote to memory of 2876 1820 svchost.exe netsh.exe PID 1820 wrote to memory of 2876 1820 svchost.exe netsh.exe PID 1820 wrote to memory of 2876 1820 svchost.exe netsh.exe PID 1820 wrote to memory of 2128 1820 svchost.exe netsh.exe PID 1820 wrote to memory of 2128 1820 svchost.exe netsh.exe PID 1820 wrote to memory of 2128 1820 svchost.exe netsh.exe PID 1820 wrote to memory of 2840 1820 svchost.exe powershell.exe PID 1820 wrote to memory of 2840 1820 svchost.exe powershell.exe PID 1820 wrote to memory of 2840 1820 svchost.exe powershell.exe PID 1820 wrote to memory of 1964 1820 svchost.exe powershell.exe PID 1820 wrote to memory of 1964 1820 svchost.exe powershell.exe PID 1820 wrote to memory of 1964 1820 svchost.exe powershell.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"C:\Users\Admin\AppData\Local\Temp\svchost_dump_SCY - Copy.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1392 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName2⤵
- Suspicious use of AdjustPrivilegeToken
PID:2572 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2452 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes2⤵
- Modifies Windows Firewall
PID:2804 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2660 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2480 -
C:\Windows\system32\schtasks.exeschtasks /delete /TN "Timer"2⤵PID:2916
-
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /ED "11/02/2024" /mo 7 /tn "Timer" /tr c:\windows\system\svchost.exe /ru SYSTEM2⤵
- Creates scheduled task(s)
PID:2256 -
C:\Windows\System\svchost.exe"C:\Windows\System\svchost.exe" formal2⤵
- Executes dropped EXE
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Windows\System32\Wbem\WMIC.exeWMIC /Node:localhost /Namespace:\\root\SecurityCenter2 Path AntiVirusProduct Get displayName3⤵
- Suspicious use of AdjustPrivilegeToken
PID:1640 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=in action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:2876 -
C:\Windows\System32\netsh.exe"C:\Windows\System32\netsh.exe" advfirewall firewall add rule name="SvcHostX" dir=out action=allow program="C:\Windows\System\svchost.exe" enable=yes3⤵
- Modifies Windows Firewall
PID:2128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath c:\windows\3⤵
- Suspicious behavior: EnumeratesProcesses
PID:2840 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath \\?\C:\Windows \3⤵
- Suspicious behavior: EnumeratesProcesses
PID:1964
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD53b0953ee0b28152960c6b6ff3b4503f8
SHA1ae47f4921df180fa8d486c90ec795b4244939ae6
SHA256694fd21fa8cb615e880c0481f3418df1032424d3162dd651b253eb9581822d23
SHA5122480ee8cf4840d6152ad75c38af8db0afee0b252bdc4276d747b9968b0605fafb0bfcfacfdb408d456b14d2a5b1aa448ad061ae4c142969dfa85b2083110fe56
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\GJ0TWNJIK4OKU32MOW40.temp
Filesize7KB
MD5fe8ccb00265d0a0137728484e192eaef
SHA1353f36ded9f375d5296c150af1af864594bbbe64
SHA2564542989a65bb31c7cb3ea324bcfad2bb0e376aa68eb6dcb868a787a19eae94e7
SHA512dfaaf70ad353fbcccdc5ede5e18f6d4d82d215333fad7869979e4061e6f88127a0973371b95b48d75893676ee77b903b46a66ee240ca36098379935595942b8a
-
Filesize
2.7MB
MD527acfbf94480631e547b5cb508d9d4fb
SHA1f6477330ca9aeb4a8cd19cc44e1a30fa9695b36c
SHA2560fd156526952ba5edb62133774a19bf72f71d3c968d01fcdb517521d45a67c5e
SHA512902ccecfa284881c1f241802b9ccd51a85da0cc48632fbd944b686d37a4fa57bc7cd01c44ef79bfe475494be780164b82ff8fa9a3e77984f6e29467843138929
-
Filesize
6.7MB
MD56e8d8695953484d9248e03b1fac25be6
SHA14a81190e26dd79ce729d78f7efb31f0e1cf98f9a
SHA256bd2cd17ebe9d6de1e9f1a08d97d267c2d345271713c588b1fe214e708eb530ef
SHA512ccac59892759f303876c7c542847b2484583fc040f5185b8002480efd22c3a5d8340c8e0ea6646d1477a708f5a2206f62ef420c63c2b43b33e798bb3966d542c
-
Filesize
5.2MB
MD55fd3d21a968f4b8a1577b5405ab1c36a
SHA1710e5ab0fceb71b982b966c3a7406ebdf1d2aa82
SHA2567ac7b42889e14cbd8c7cebe692566ca045d0034f9ff103fc3ef9c5e035dc594f
SHA512085a31c0412ba0a3d612a66ec8d95ce900e148240f92f9ec8c4d07b6c8e32cf233e92aefc7b4b53a91f5eacacd1cf3a8fcdf8cd7c206afa46014a9e4a9ddf53f