Static task
static1
Behavioral task
behavioral1
Sample
svchost.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
svchost.exe
Resource
win10v2004-20240426-en
General
-
Target
svchost.bin
-
Size
55KB
-
MD5
ec3f6c635a79aae4ad8e8e3c1a69b074
-
SHA1
7e486b2c8255442961db17a9aa8f045cf267117e
-
SHA256
c926c37c94e516476f12d6c46f73b6b74296f1ab273b8a032f287382cdd5d855
-
SHA512
4dd0356116068390ca4b98b2b82a1123094bfcd23d6282e4aee47a658313ab0bffc9ae947541e3faab367d53c6153e08d526be02280536bad0a0b58b1fbfae46
-
SSDEEP
1536:3jCQTodrukUoaAkw0w0AggEQMay2sAUamwEqa+06fYzZUdmlPdcl8bGY3:nT40F0SBqq
Malware Config
Signatures
-
Detects command variations typically used by ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICIOUS_GENRansomware -
Detects executables containing many references to VEEAM. Observed in ransomware 1 IoCs
resource yara_rule sample INDICATOR_SUSPICOUS_EXE_References_VEEAM -
Unsigned PE 1 IoCs
Checks for missing Authenticode signature.
resource svchost.bin
Files
-
svchost.bin.exe windows:5 windows x86 arch:x86
2febb545b22fc82c1d531de3fa84859f
Headers
DLL Characteristics
IMAGE_DLLCHARACTERISTICS_DYNAMIC_BASE
IMAGE_DLLCHARACTERISTICS_NX_COMPAT
IMAGE_DLLCHARACTERISTICS_NO_SEH
IMAGE_DLLCHARACTERISTICS_TERMINAL_SERVER_AWARE
File Characteristics
IMAGE_FILE_EXECUTABLE_IMAGE
IMAGE_FILE_32BIT_MACHINE
Imports
kernel32
LoadLibraryA
GetModuleHandleA
GetDriveTypeW
FindFirstVolumeW
FindNextVolumeW
FindVolumeClose
SetVolumeMountPointW
GetVolumePathNamesForVolumeNameW
CreateToolhelp32Snapshot
Process32FirstW
Process32NextW
InitializeCriticalSection
EnterCriticalSection
LeaveCriticalSection
DeleteCriticalSection
WriteFile
lstrlenA
CreateFileW
ExitProcess
CreateThread
ExitThread
WaitForMultipleObjects
GetLogicalDrives
lstrcmpW
ReadFile
SetFilePointerEx
FindClose
GetSystemInfo
lstrcmpiW
lstrcpyW
lstrcatW
CreateMutexA
OpenMutexA
SetProcessShutdownParameters
GetCommandLineW
SetFileAttributesW
FindFirstFileW
FindNextFileW
MoveFileExW
WideCharToMultiByte
HeapAlloc
HeapFree
GetProcessHeap
ReleaseSemaphore
WaitForSingleObject
CreateSemaphoreA
SetUnhandledExceptionFilter
UnhandledExceptionFilter
lstrlenW
GetTickCount
CloseHandle
Sleep
GetLastError
TerminateProcess
GetCurrentProcess
OpenProcess
GetFileSizeEx
GetProcAddress
IsProcessorFeaturePresent
user32
wsprintfA
shell32
CommandLineToArgvW
ShellExecuteW
SHEmptyRecycleBinA
advapi32
OpenSCManagerA
ControlService
CloseServiceHandle
CryptAcquireContextW
OpenServiceA
QueryServiceStatusEx
CryptReleaseContext
CryptGenRandom
EnumDependentServicesA
netapi32
NetApiBufferFree
NetShareEnum
mpr
WNetCloseEnum
WNetEnumResourceW
WNetOpenEnumW
WNetGetConnectionW
shlwapi
PathFindFileNameW
Sections
.text Size: 48KB - Virtual size: 47KB
IMAGE_SCN_CNT_CODE
IMAGE_SCN_MEM_EXECUTE
IMAGE_SCN_MEM_READ
.data Size: 512B - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
IMAGE_SCN_MEM_WRITE
.idata Size: 2KB - Virtual size: 2KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.rsrc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_READ
.reloc Size: 1KB - Virtual size: 1KB
IMAGE_SCN_CNT_INITIALIZED_DATA
IMAGE_SCN_MEM_DISCARDABLE
IMAGE_SCN_MEM_READ