Analysis
-
max time kernel
117s -
max time network
118s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
02-12-2024 09:43
Static task
static1
Behavioral task
behavioral1
Sample
9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe
Resource
win10v2004-20241007-en
General
-
Target
9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe
-
Size
111KB
-
MD5
ce1c2378b676d5911eddc3758624c976
-
SHA1
c22076d3747e231f12b5773dd825b9dbf7231ac6
-
SHA256
9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4
-
SHA512
a575b4cb25220bba8792bb0dc9f0feb9d3241d4a01c487bcfb6af45fe2ad380ab42525be345269f4eec130d4a0faba63e7cf2766c3f71664b287b9820827d10a
-
SSDEEP
3072:SwUYPGG9eAoHSwMm8KzF6N0dKMW+Wb+EyjOIpiAAiLF:SwUYz93oHSHBnyWj+EfIEwR
Malware Config
Extracted
metasploit
encoder/call4_dword_xor
Signatures
-
MetaSploit
Detected malicious payload which is part of the Metasploit Framework, likely generated with msfvenom or similar.
-
Metasploit family
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svvchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\Microsoft Driver Setup = "C:\\Windows\\scvchost.exe" svvchost.exe -
Executes dropped EXE 3 IoCs
pid Process 464 svvchost.exe 1996 scvchost.exe 8 svvchost.exe -
Adds Run key to start application 2 TTPs 3 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svvchost.exe = "C:\\Windows\\system32\\svvchost.exe" scvchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\svvchost.exe = "C:\\Windows\\system32\\svvchost.exe" 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\Microsoft Driver Setup = "C:\\Windows\\scvchost.exe" svvchost.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA scvchost.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\svvchost.exe 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe File opened for modification C:\Windows\SysWOW64\svvchost.exe 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe File created C:\Windows\SysWOW64\svvchost.exe scvchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3736 set thread context of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 1996 set thread context of 8 1996 scvchost.exe 85 -
Drops file in Windows directory 3 IoCs
description ioc Process File created C:\Windows\scvchost.exe svvchost.exe File opened for modification C:\Windows\scvchost.exe svvchost.exe File created C:\Windows\logfile32.txt svvchost.exe -
System Location Discovery: System Language Discovery 1 TTPs 4 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language scvchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svvchost.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language svvchost.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 464 svvchost.exe 464 svvchost.exe 464 svvchost.exe 464 svvchost.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 3736 wrote to memory of 464 3736 9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe 83 PID 464 wrote to memory of 1996 464 svvchost.exe 84 PID 464 wrote to memory of 1996 464 svvchost.exe 84 PID 464 wrote to memory of 1996 464 svvchost.exe 84 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85 PID 1996 wrote to memory of 8 1996 scvchost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe"C:\Users\Admin\AppData\Local\Temp\9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:3736 -
C:\Windows\SysWOW64\svvchost.exe"C:\Users\Admin\AppData\Local\Temp\9b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4.exe"2⤵
- Adds policy Run key to start application
- Executes dropped EXE
- Adds Run key to start application
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:464 -
C:\Windows\scvchost.exe"C:\Windows\scvchost.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\svvchost.exe"C:\Windows\scvchost.exe"4⤵
- Executes dropped EXE
- Drops file in Windows directory
- System Location Discovery: System Language Discovery
PID:8
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
111KB
MD5ce1c2378b676d5911eddc3758624c976
SHA1c22076d3747e231f12b5773dd825b9dbf7231ac6
SHA2569b67914768477c27bfec54e79955674d878e6489abc21344f13166ca9446c9a4
SHA512a575b4cb25220bba8792bb0dc9f0feb9d3241d4a01c487bcfb6af45fe2ad380ab42525be345269f4eec130d4a0faba63e7cf2766c3f71664b287b9820827d10a