Analysis
-
max time kernel
119s -
max time network
30s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
21/08/2024, 17:51
Static task
static1
Behavioral task
behavioral1
Sample
6ced6b3179b504f1bd0ec50341d57f80N.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
6ced6b3179b504f1bd0ec50341d57f80N.exe
Resource
win10v2004-20240802-en
General
-
Target
6ced6b3179b504f1bd0ec50341d57f80N.exe
-
Size
208KB
-
MD5
6ced6b3179b504f1bd0ec50341d57f80
-
SHA1
14ac437d630acec9a10e50c0d69869dfae1a2a2e
-
SHA256
a364803d85f95d3aa6acb198924173dac762356930bf79b362e058f37aea90b2
-
SHA512
78361b48bc8b60604966729215d683eda270daf1d17e2a526ffc27877b2ad59c7f375152f692aad0c66c15fab4b0101e671b22823ed77f8cce43a43e27fa154c
-
SSDEEP
1536:+fuxw10lxJM5y8w5OZRVmgyDl+cWaxJcveQZNTRSb3EBAR1AlQPsxjheYhpXN5yh:a0OtF2Qo7VsJgisxlYegEX0ZZbW
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2944 svhust.exe 1276 svhust.exe 928 svhust.exe -
Loads dropped DLL 6 IoCs
pid Process 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 2944 svhust.exe 2944 svhust.exe -
resource yara_rule behavioral1/memory/1796-361-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/928-776-0x0000000000400000-0x0000000000479000-memory.dmp upx behavioral1/memory/1276-764-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1796-780-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/1276-784-0x0000000000400000-0x000000000040B000-memory.dmp upx behavioral1/memory/928-787-0x0000000000400000-0x0000000000479000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000\Software\Microsoft\Windows\CurrentVersion\Run\svhust = "C:\\Users\\Admin\\AppData\\Roaming\\svhust\\svhust.exe" reg.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\VideoDriver = "C:\\Windows\\system32\\winldr.exe" svhust.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\winldr.exe svhust.exe File created C:\Windows\System32\winldr.exe svhust.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 2432 set thread context of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2944 set thread context of 1276 2944 svhust.exe 35 PID 2944 set thread context of 928 2944 svhust.exe 36 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 7 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ced6b3179b504f1bd0ec50341d57f80N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language reg.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhust.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhust.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svhust.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 6ced6b3179b504f1bd0ec50341d57f80N.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe Token: SeDebugPrivilege 1276 svhust.exe -
Suspicious use of FindShellTrayWindow 1 IoCs
pid Process 928 svhust.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 2944 svhust.exe 1276 svhust.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 2432 wrote to memory of 1796 2432 6ced6b3179b504f1bd0ec50341d57f80N.exe 30 PID 1796 wrote to memory of 2300 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 31 PID 1796 wrote to memory of 2300 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 31 PID 1796 wrote to memory of 2300 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 31 PID 1796 wrote to memory of 2300 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 31 PID 2300 wrote to memory of 2904 2300 cmd.exe 33 PID 2300 wrote to memory of 2904 2300 cmd.exe 33 PID 2300 wrote to memory of 2904 2300 cmd.exe 33 PID 2300 wrote to memory of 2904 2300 cmd.exe 33 PID 1796 wrote to memory of 2944 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 34 PID 1796 wrote to memory of 2944 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 34 PID 1796 wrote to memory of 2944 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 34 PID 1796 wrote to memory of 2944 1796 6ced6b3179b504f1bd0ec50341d57f80N.exe 34 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 1276 2944 svhust.exe 35 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36 PID 2944 wrote to memory of 928 2944 svhust.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ced6b3179b504f1bd0ec50341d57f80N.exe"C:\Users\Admin\AppData\Local\Temp\6ced6b3179b504f1bd0ec50341d57f80N.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\6ced6b3179b504f1bd0ec50341d57f80N.exe"C:\Users\Admin\AppData\Local\Temp\6ced6b3179b504f1bd0ec50341d57f80N.exe"2⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1796 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\PDEAA.bat" "3⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "svhust" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\svhust\svhust.exe" /f4⤵
- Adds Run key to start application
- System Location Discovery: System Language Discovery
PID:2904
-
-
-
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1276
-
-
C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"C:\Users\Admin\AppData\Roaming\svhust\svhust.exe"4⤵
- Executes dropped EXE
- Adds Run key to start application
- Drops file in System32 directory
- System Location Discovery: System Language Discovery
- Suspicious use of FindShellTrayWindow
PID:928
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
141B
MD5e83a2e0b3c1e03dfb96ffd9924117a45
SHA127a3e4ba115ba1bad0bf094f5b97e768d1ece33e
SHA256655407d94fff9e707712a588d97a2017cc1c9d690a67c688ed0abcb79e452b13
SHA5125f61686a3b7db3544d83a4f2ce1a75868c7dc266709f72a34eafecc3a26696a985b1912a559aed8f5a2cacbfe26be9beae2374340d1801bb18473de785557480
-
Filesize
208KB
MD5e8347a83c4f08352612a48a428fb9078
SHA1f9af6ae43ca4915b578e04cc6211a41b2fbd8f99
SHA256f792e0f5b13e4ee2201a515f70b97c7cc0616866a31cd92c5e3651927234ee19
SHA512209043b22ee190436d972e4c56be5bec1d224e2a88d7b3bf228ef1d4bc4e476df02e2338e441e335c5149c57ba9ef6bedf679037b611b9d9f85581b5661a8456