Create Interactive Tour

Windows Analysis Report
svchost.exe

Overview

General Information

Sample name:svchost.exe
Analysis ID:1380578
MD5:a5437b874a27ef2de31a29972f99f813
SHA1:020cacb297b6722e41ce339b47066256a63c6627
SHA256:a5b910dc7e865a9139f612dc2ecae522f4cc1e642be12275c4f6df1032c6aabd
Infos:

Detection

Score:84
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Antivirus / Scanner detection for submitted sample
Antivirus detection for dropped file
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Drops PE files with benign system names
Machine Learning detection for dropped file
Machine Learning detection for sample
Checks for available system drives (often done to infect USB drives)
Creates a process in suspended mode (likely to inject code)
Creates or modifies windows services
Drops PE files
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
May infect USB drives
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample file is different than original file name gathered from version info
Tries to load missing DLLs
Uses 32bit PE files

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64native
  • svchost.exe (PID: 5240 cmdline: C:\Users\user\Desktop\svchost.exe MD5: A5437B874A27EF2DE31A29972F99F813)
    • svchost.exe (PID: 7252 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe" MD5: A5437B874A27EF2DE31A29972F99F813)
  • svchost.exe (PID: 6380 cmdline: C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s SmsRouter MD5: F586835082F632DC8D9404D83BC16316)
  • svchost.exe (PID: 5064 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe" MD5: A5437B874A27EF2DE31A29972F99F813)
  • svchost.exe (PID: 7780 cmdline: "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe" MD5: A5437B874A27EF2DE31A29972F99F813)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: svchost.exeAvira: detected
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeAvira: detection malicious, Label: TR/ATRAPS.Gen
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeReversingLabs: Detection: 95%
Source: svchost.exeReversingLabs: Detection: 95%
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeJoe Sandbox ML: detected
Source: svchost.exeJoe Sandbox ML: detected
Source: svchost.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: z:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: x:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: v:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: t:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: r:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: p:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: n:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: l:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: j:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: h:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: f:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: d:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: y:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: w:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: u:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: s:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: q:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: o:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: m:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: k:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: i:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: g:Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeFile opened: e:Jump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: c:Jump to behavior
Source: svchost.exe, 00000000.00000003.8525311503.000000000083C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: :\autorun.inf
Source: svchost.exe, 00000000.00000003.8525311503.000000000083C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [autorun]
Source: svchost.exe, 00000000.00000000.8524829205.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: :\autorun.inf
Source: svchost.exe, 00000000.00000000.8524829205.0000000000401000.00000020.00000001.01000000.00000003.sdmpBinary or memory string: [autorun]
Source: svchost.exeBinary or memory string: :\autorun.inf
Source: svchost.exeBinary or memory string: [autorun]
Source: svchost.exe.0.drBinary or memory string: :\autorun.inf
Source: svchost.exe.0.drBinary or memory string: [autorun]
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
Source: unknownDNS traffic detected: queries for: qzx.no-ip.info
Source: svchost.exe, 00000000.00000002.8533365998.00000000008B2000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \Volatile EnvironmentCentennialStoreAppBinProductVersionAppXBundleManifest.xmlProfileImagePathOriginalFileNameP2 vs svchost.exe
Source: C:\Users\user\Desktop\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\Desktop\svchost.exeSection loaded: starttiledata.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Windows\System32\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeSection loaded: edgegdi.dllJump to behavior
Source: svchost.exeStatic PE information: EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
Source: classification engineClassification label: mal84.winEXE@6/6@2/0
Source: C:\Users\user\Desktop\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\ddos556mutex
Source: C:\Users\user\Desktop\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\ddos554mutex
Source: C:\Users\user\Desktop\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Borland\Delphi\LocalesJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: svchost.exeReversingLabs: Detection: 95%
Source: C:\Users\user\Desktop\svchost.exeFile read: C:\Users\user\Desktop\svchost.exeJump to behavior
Source: unknownProcess created: C:\Users\user\Desktop\svchost.exe C:\Users\user\Desktop\svchost.exe
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe"
Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s SmsRouter
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe"
Source: unknownProcess created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe"
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe" Jump to behavior
Source: C:\Users\user\Desktop\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{20D04FE0-3AEA-1069-A2D8-08002B30309D}\InProcServer32Jump to behavior

Persistence and Installation Behavior

barindex
Source: C:\Users\user\Desktop\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeJump to dropped file
Source: C:\Users\user\Desktop\svchost.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeJump to dropped file
Source: C:\Windows\System32\svchost.exeRegistry key created: HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Services\SmsRouter\State\Registration\MapJump to behavior
Source: C:\Users\user\Desktop\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchost.exeJump to behavior
Source: C:\Users\user\Desktop\svchost.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run svchost.exeJump to behavior
Source: C:\Users\user\Desktop\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exeWindow / User API: threadDelayed 9734Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe TID: 8124Thread sleep count: 239 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe TID: 8124Thread sleep time: -239000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe TID: 1436Thread sleep time: -50000s >= -30000sJump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe TID: 8124Thread sleep count: 9734 > 30Jump to behavior
Source: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe TID: 8124Thread sleep time: -9734000s >= -30000sJump to behavior
Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\userJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet Explorer\Quick Launch\desktop.iniJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Microsoft\Internet ExplorerJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\Roaming\MicrosoftJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppDataJump to behavior
Source: C:\Users\user\Desktop\svchost.exeFile opened: C:\Users\user\AppData\RoamingJump to behavior
Source: svchost.exe, 00000002.00000002.13613338636.0000000000824000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dllI
Source: svchost.exe, 00000000.00000002.8532956046.0000000000812000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW%SystemRoot%\system32\mswsock.dll
Source: C:\Users\user\Desktop\svchost.exeProcess created: C:\Users\user\AppData\Roaming\Microsoft\svchost.exe "C:\Users\user\AppData\Roaming\Microsoft\svchost.exe" Jump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.log VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.jfm VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\SmsInterceptStore.db VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.chk VolumeInformationJump to behavior
Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\SmsRouter\MessageStore\edb.chk VolumeInformationJump to behavior
ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
Gather Victim Identity InformationAcquire Infrastructure2
Replication Through Removable Media
Windows Management Instrumentation1
Windows Service
1
Windows Service
11
Masquerading
OS Credential Dumping111
Security Software Discovery
Remote ServicesData from Local System1
Non-Application Layer Protocol
Exfiltration Over Other Network MediumAbuse Accessibility Features
CredentialsDomainsDefault AccountsScheduled Task/Job1
Registry Run Keys / Startup Folder
11
Process Injection
2
Virtualization/Sandbox Evasion
LSASS Memory2
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable Media1
Application Layer Protocol
Exfiltration Over BluetoothNetwork Denial of Service
Email AddressesDNS ServerDomain AccountsAt1
DLL Side-Loading
1
Registry Run Keys / Startup Folder
11
Process Injection
Security Account Manager1
Application Window Discovery
SMB/Windows Admin SharesData from Network Shared DriveSteganographyAutomated ExfiltrationData Encrypted for Impact
Employee NamesVirtual Private ServerLocal AccountsCronLogin Hook1
DLL Side-Loading
1
DLL Side-Loading
NTDS11
Peripheral Device Discovery
Distributed Component Object ModelInput CaptureProtocol ImpersonationTraffic DuplicationData Destruction
Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon ScriptSoftware PackingLSA Secrets2
File and Directory Discovery
SSHKeyloggingFallback ChannelsScheduled TransferData Encrypted for Impact
Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC ScriptsSteganographyCached Domain Credentials21
System Information Discovery
VNCGUI Input CaptureMultiband CommunicationData Transfer Size LimitsService Stop
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1380578 Sample: svchost.exe Startdate: 24/01/2024 Architecture: WINDOWS Score: 84 22 qzx.no-ip.info 2->22 30 Antivirus / Scanner detection for submitted sample 2->30 32 Multi AV Scanner detection for submitted file 2->32 34 Machine Learning detection for sample 2->34 7 svchost.exe 1 3 2->7         started        11 svchost.exe 13 4 2->11         started        13 svchost.exe 2->13         started        15 svchost.exe 2->15         started        signatures3 process4 file5 20 C:\Users\user\AppData\Roaming\...\svchost.exe, PE32 7->20 dropped 36 Drops PE files with benign system names 7->36 17 svchost.exe 7->17         started        signatures6 process7 signatures8 24 Antivirus detection for dropped file 17->24 26 Multi AV Scanner detection for dropped file 17->26 28 Machine Learning detection for dropped file 17->28

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version
No bigger version

windows-stand
SourceDetectionScannerLabelLink
svchost.exe100%AviraTR/ATRAPS.Gen
svchost.exe100%Joe Sandbox ML
svchost.exe96%ReversingLabsWin32.Backdoor.DarkDDoSer
SourceDetectionScannerLabelLink
C:\Users\user\AppData\Roaming\Microsoft\svchost.exe100%AviraTR/ATRAPS.Gen
C:\Users\user\AppData\Roaming\Microsoft\svchost.exe100%Joe Sandbox ML
C:\Users\user\AppData\Roaming\Microsoft\svchost.exe96%ReversingLabsWin32.Backdoor.DarkDDoSer
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

NameIPActiveMaliciousAntivirus DetectionReputation
qzx.no-ip.info
0.0.0.0
truefalse
    unknown
    No contacted IP infos
    Joe Sandbox version:39.0.0 Ruby
    Analysis ID:1380578
    Start date and time:2024-01-24 19:00:24 +01:00
    Joe Sandbox product:CloudBasic
    Overall analysis duration:0h 12m 58s
    Hypervisor based Inspection enabled:false
    Report type:full
    Cookbook file name:default.jbs
    Analysis system description:Windows 10 64 bit 20H2 Native physical Machine for testing VM-aware malware (Office 2019, Chrome 93, Firefox 91, Adobe Reader DC 21, Java 8 Update 301
    Run name:Suspected Instruction Hammering
    Number of analysed new started processes analysed:6
    Number of new started drivers analysed:0
    Number of existing processes analysed:0
    Number of existing drivers analysed:0
    Number of injected processes analysed:0
    Technologies:
    • HCA enabled
    • EGA enabled
    • AMSI enabled
    Analysis Mode:default
    Analysis stop reason:Timeout
    Sample name:svchost.exe
    Detection:MAL
    Classification:mal84.winEXE@6/6@2/0
    EGA Information:Failed
    HCA Information:
    • Successful, ratio: 100%
    • Number of executed functions: 0
    • Number of non-executed functions: 0
    Cookbook Comments:
    • Found application associated with file extension: .exe
    • Sleeps bigger than 100000000ms are automatically reduced to 1000ms
    • Exclude process from analysis (whitelisted): dllhost.exe
    • Execution Graph export aborted for target svchost.exe, PID 5064 because there are no executed function
    • Execution Graph export aborted for target svchost.exe, PID 5240 because there are no executed function
    • Execution Graph export aborted for target svchost.exe, PID 7252 because there are no executed function
    • Execution Graph export aborted for target svchost.exe, PID 7780 because there are no executed function
    • Report size getting too big, too many NtOpenKeyEx calls found.
    • Report size getting too big, too many NtProtectVirtualMemory calls found.
    • Report size getting too big, too many NtQueryValueKey calls found.
    • VT rate limit hit for: svchost.exe
    TimeTypeDescription
    18:02:29AutostartRun: HKCU\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe C:\Users\user\AppData\Roaming\Microsoft\svchost.exe
    18:02:37AutostartRun: HKCU64\Software\Microsoft\Windows\CurrentVersion\Run svchost.exe C:\Users\user\AppData\Roaming\Microsoft\svchost.exe
    19:03:04API Interceptor50436309x Sleep call for process: svchost.exe modified
    No context
    No context
    No context
    No context
    No context
    Process:C:\Windows\System32\svchost.exe
    File Type:Extensible storage engine DataBase, version 0x620, checksum 0x5fc8523c, page size 4096, Windows version 10.0
    Category:dropped
    Size (bytes):196608
    Entropy (8bit):0.9432202797293127
    Encrypted:false
    SSDEEP:384:12USNM+c0R4biVDbuYK2HRMakinEOhzYp7pV4Pd16ErY2USNM+WDbuYK2HRMEkim:BShH9KAXk/86ShmKAhkzyDFqfg
    MD5:B3D6D3C64C4BA53A19BA1D278513A12F
    SHA1:DB39609F6D12660C88B9A1D6BD59341A070F1BFF
    SHA-256:DB816CF0CF25B34E2E7A7B586C7CEC89CAD244D093CDA6D11427E12BD267A18A
    SHA-512:1CB13DDBF882BD711B583F26A9CB7E638FCE57DB8EB077752517713A8DCE49FB7F6037651F6008731553380947DB86F296E7D13CFF77248927859649E1D97941
    Malicious:false
    Reputation:low
    Preview:_.R<... ................c...*...y].....................6....... ....|.. ....|..h....... ....|..6.............)b.*...y].........................................................................................................bJ......n........................................................................................................... ............................................................................................................................................................................................................*...y}.................................)@9{ ....|...................@. ....|...........................#......6.......................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\svchost.exe
    File Type:data
    Category:dropped
    Size (bytes):16384
    Entropy (8bit):0.07502846159387302
    Encrypted:false
    SSDEEP:3:z9ZrF3ThZtDGZWbk4V6yXXULiwtAllv5asllF/ww/ll:3rF3ByZWbkty0LiQAXas1Hll
    MD5:2110E7C460426247CAD6A3958D6B49F2
    SHA1:4417B17D1A672B0C6FC30D2D134BA3E5672788F6
    SHA-256:CED71B239F1A8A0EB4CB9ABD2FEBAFB60BEDE431CE2EC1037D65A15A72440863
    SHA-512:028A4E7597C25EB9E4E6EF27F060CED85AC2191D2E88AA1F3F9B2ACDA1B77E5F3A7B9C0C149CDE0AAF03201289FC52FB180EFC600942891F17ABDC604A30765C
    Malicious:false
    Reputation:low
    Preview:!.,......................................*...y}. ....|.. ....|.......... ....|s. ....|..... ....|...................@. ....|..........................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\svchost.exe
    File Type:data
    Category:dropped
    Size (bytes):8192
    Entropy (8bit):0.37856674400608364
    Encrypted:false
    SSDEEP:6:qg/0sOaaXOXaaXO3QmDsil62g/0sOaaXOXaaXO3QmDsil6:msOaakaaIQQrlfsOaakaaIQQrl
    MD5:F820B3D5B0A87B5751B1B753D543ACA0
    SHA1:B22DD4D923AF89B2206BB79FAEA6C85E6227F9EE
    SHA-256:8F02DCF9D6134BCA95CE44E2242ACE0D42CF711796065EEE31BAA792336B9B77
    SHA-512:4D6EA2935BFADB371F17B32A41DAACB831AC0B86FF5B47922630126425146A0AC2961F564BC16A3478D80F8F61EC4093DA1E6B67B4D65DC0B85FA1B7F3CFFC5E
    Malicious:false
    Reputation:low
    Preview:B....................)b.*...y].................C:\ProgramData\Microsoft\SmsRouter\MessageStore\.....................................................................................................................................................................................................................C:\ProgramData\Microsoft\SmsRouter\MessageStore\......................................................................................................................................................................................................................0u........................5w.................................................................................................................................................................................................................................................................................................................................................................................................................
    Process:C:\Windows\System32\svchost.exe
    File Type:data
    Category:dropped
    Size (bytes):65536
    Entropy (8bit):0.2990481924996545
    Encrypted:false
    SSDEEP:96:3Rtktoo1WktlL1YktZL1ktkt6L1l/ktUL1:3R2H5C2q8
    MD5:144139DD8055DDFA0AF626A309BD806F
    SHA1:4EA4F6039E22357F3878140E6170E2F54191B071
    SHA-256:160BA84A516BF031A97C1FBDCE59436B82280EA1A778BD8D38E3BADB9381DCC0
    SHA-512:17EB603590EE5BE80003B972A0C1615517933F8AB590BADE7F78C93086607D5797D8D5949EFB2286434D6A752EC91F7739E910EB201AFFA5A2426F7BC42D5E48
    Malicious:false
    Reputation:low
    Preview:sk.+............7....{.......zO.........<.....)b.*...y].................C:\ProgramData\Microsoft\SmsRouter\MessageStore\.....................................................................................................................................................................................................................C:\ProgramData\Microsoft\SmsRouter\MessageStore\......................................................................................................................................................................................................................0u........................5w......................................#......... ..................h.......6........c...*...y].................C.:.\.P.r.o.g.r.a.m.D.a.t.a.\.M.i.c.r.o.s.o.f.t.\.S.m.s.R.o.u.t.e.r.\.M.e.s.s.a.g.e.S.t.o.r.e.\.S.m.s.I.n.t.e.r.c.e.p.t.S.t.o.r.e...d.b..................................................................................................................................
    Process:C:\Users\user\Desktop\svchost.exe
    File Type:PE32 executable (GUI) Intel 80386, for MS Windows
    Category:dropped
    Size (bytes):130048
    Entropy (8bit):6.470869913601849
    Encrypted:false
    SSDEEP:3072:YXqmPu+E0KnKbv53Dyyl10cbDBxDgCHDV/9Sn2R31LBD4Ou1mT/+p:YXqmFEznKj5GkdH+n0tBxs
    MD5:A5437B874A27EF2DE31A29972F99F813
    SHA1:020CACB297B6722E41CE339B47066256A63C6627
    SHA-256:A5B910DC7E865A9139F612DC2ECAE522F4CC1E642BE12275C4F6DF1032C6AABD
    SHA-512:DF9A2E453B2F99AD83477BAD99BC6C9CD8372FA5B2B4FF56EDDDE5381419CAC0EF711A4B7290DAFC0D4F737965A85819225A15CA871FF525BC9001C428E21B6D
    Malicious:true
    Antivirus:
    • Antivirus: Avira, Detection: 100%
    • Antivirus: Joe Sandbox ML, Detection: 100%
    • Antivirus: ReversingLabs, Detection: 96%
    Reputation:low
    Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7........................................................................................................................................PE..L....^B*.....................T....................@..........................p...................@...................................P....................... ... ..................................................................................CODE....p........................... ..`DATA....|...........................@...BSS......................................idata..............................@....tls.....................................rdata..............................@..P.reloc... ... ..."..................@..P.rsrc........P......................@..P.............p......................@..P........................................................................................................................................
    Process:C:\Users\user\Desktop\svchost.exe
    File Type:ASCII text, with CRLF line terminators
    Category:modified
    Size (bytes):26
    Entropy (8bit):3.95006375643621
    Encrypted:false
    SSDEEP:3:ggPYV:rPYV
    MD5:187F488E27DB4AF347237FE461A079AD
    SHA1:6693BA299EC1881249D59262276A0D2CB21F8E64
    SHA-256:255A65D30841AB4082BD9D0EEA79D49C5EE88F56136157D8D6156AEF11C12309
    SHA-512:89879F237C0C051EBE784D0690657A6827A312A82735DA42DAD5F744D734FC545BEC9642C19D14C05B2F01FF53BC731530C92F7327BB7DC9CDE1B60FB21CD64E
    Malicious:false
    Reputation:high, very likely benign file
    Preview:[ZoneTransfer]....ZoneId=0
    File type:PE32 executable (GUI) Intel 80386, for MS Windows
    Entropy (8bit):6.470869913601849
    TrID:
    • Win32 Executable (generic) a (10002005/4) 93.47%
    • Win32 Executable Borland Delphi 7 (665061/41) 6.21%
    • Win32 Executable Delphi generic (14689/80) 0.14%
    • Windows Screen Saver (13104/52) 0.12%
    • Win16/32 Executable Delphi generic (2074/23) 0.02%
    File name:svchost.exe
    File size:130'048 bytes
    MD5:a5437b874a27ef2de31a29972f99f813
    SHA1:020cacb297b6722e41ce339b47066256a63c6627
    SHA256:a5b910dc7e865a9139f612dc2ecae522f4cc1e642be12275c4f6df1032c6aabd
    SHA512:df9a2e453b2f99ad83477bad99bc6c9cd8372fa5b2b4ff56eddde5381419cac0ef711a4b7290dafc0d4f737965a85819225a15ca871ff525bc9001c428e21b6d
    SSDEEP:3072:YXqmPu+E0KnKbv53Dyyl10cbDBxDgCHDV/9Sn2R31LBD4Ou1mT/+p:YXqmFEznKj5GkdH+n0tBxs
    TLSH:21D35B23F2D1C872D1790A7C9C05A2D4693EBE203D39158BB7E95F0D69BC292992D3C7
    File Content Preview:MZP.....................@...............................................!..L.!..This program must be run under Win32..$7.......................................................................................................................................
    Icon Hash:90cececece8e8eb0
    Entrypoint:0x41b21c
    Entrypoint Section:CODE
    Digitally signed:false
    Imagebase:0x400000
    Subsystem:windows gui
    Image File Characteristics:EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, BYTES_REVERSED_LO, 32BIT_MACHINE, BYTES_REVERSED_HI
    DLL Characteristics:
    Time Stamp:0x2A425E19 [Fri Jun 19 22:22:17 1992 UTC]
    TLS Callbacks:
    CLR (.Net) Version:
    OS Version Major:4
    OS Version Minor:0
    File Version Major:4
    File Version Minor:0
    Subsystem Version Major:4
    Subsystem Version Minor:0
    Import Hash:dbefe8b82d8d15bd0f8daeaf2520d5fc
    Instruction
    push ebp
    mov ebp, esp
    add esp, FFFFFFECh
    push ebx
    xor eax, eax
    mov dword ptr [ebp-14h], eax
    mov eax, 0041B134h
    call 00007F265CBC733Bh
    xor eax, eax
    push ebp
    push 0041B322h
    push dword ptr fs:[eax]
    mov dword ptr fs:[eax], esp
    mov dl, 01h
    mov eax, dword ptr [0041782Ch]
    call 00007F265CBC4959h
    mov ebx, eax
    mov eax, ebx
    call 00007F265CBD8AC8h
    mov eax, 0041D974h
    mov edx, 0041B338h
    call 00007F265CBC5531h
    mov cl, 01h
    mov dl, 01h
    mov eax, dword ptr [00417BB8h]
    call 00007F265CBD48B3h
    mov dword ptr [0041D96Ch], eax
    lea ecx, dword ptr [ebp-14h]
    mov eax, dword ptr [ebx+04h]
    mov eax, dword ptr [eax]
    mov edx, 0041B34Ch
    call 00007F265CBDAE30h
    mov edx, dword ptr [ebp-14h]
    mov eax, dword ptr [0041D96Ch]
    add eax, 000001F0h
    call 00007F265CBC54FAh
    mov eax, dword ptr [0041D96Ch]
    mov dword ptr [eax+000001ECh], 00000C0Dh
    mov eax, dword ptr [0041D974h]
    call 00007F265CBDB8C1h
    push 00000BB8h
    call 00007F265CBCD15Bh
    push 0041B354h
    push 00000000h
    push 00000000h
    call 00007F265CBC73C5h
    call 00007F265CBC74C0h
    cmp eax, 000000B7h
    jne 00007F265CBDC299h
    push 00000000h
    call 00007F265CBC73FAh
    mov eax, dword ptr [0041D96Ch]
    NameVirtual AddressVirtual Size Is in Section
    IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IMPORT0x1e0000x100a.idata
    IMAGE_DIRECTORY_ENTRY_RESOURCE0x250000x15f0.rsrc
    IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
    IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
    IMAGE_DIRECTORY_ENTRY_BASERELOC0x220000x20bc.reloc
    IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
    IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
    IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
    IMAGE_DIRECTORY_ENTRY_TLS0x210000x18.rdata
    IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
    IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_IAT0x00x0
    IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
    IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
    IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
    NameVirtual AddressVirtual SizeRaw SizeMD5Xored PEZLIB ComplexityFile TypeEntropyCharacteristics
    CODE0x10000x1a3700x1a4001c279d40365f65f8dfe095c2d186b7abFalse0.532524181547619data6.464573109044044IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
    DATA0x1c0000x67c0x8007ee9f9d6eddb558af2178718b3ccf711False0.4130859375data3.7422528778462483IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    BSS0x1d0000x9950x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .idata0x1e0000x100a0x1200bca9e9c17af329013dfcbc3ddb694a2cFalse0.3528645833333333data4.5373089904389765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .tls0x200000xc0x0d41d8cd98f00b204e9800998ecf8427eFalse0empty0.0IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
    .rdata0x210000x180x200416c35f1fadc540ed3e6d4c80444ff2aFalse0.05078125data0.17014565200323517IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
    .reloc0x220000x20bc0x220081365dff62c2e939156080bf74bdcb3aFalse0.7294347426470589data6.599968615323305IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
    .rsrc0x250000x15f00x1600c1394bda7ec719e00a9a88ba1803bcd2False0.33647017045454547data3.65273590990615IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_SHARED, IMAGE_SCN_MEM_READ
    NameRVASizeTypeLanguageCountryZLIB Complexity
    RT_STRING0x252500x360data0.3611111111111111
    RT_STRING0x255b00x200data0.484375
    RT_STRING0x257b00xecdata0.5508474576271186
    RT_STRING0x2589c0x1e4data0.5082644628099173
    RT_STRING0x25a800x3f4data0.308300395256917
    RT_STRING0x25e740x340data0.40625
    RT_STRING0x261b40x2d4data0.393646408839779
    RT_RCDATA0x264880x1cdata1.2142857142857142
    RT_RCDATA0x264a40x10data1.5
    RT_RCDATA0x264b40x13cdata0.8544303797468354
    DLLImport
    kernel32.dllDeleteCriticalSection, LeaveCriticalSection, EnterCriticalSection, InitializeCriticalSection, VirtualFree, VirtualAlloc, LocalFree, LocalAlloc, GetTickCount, QueryPerformanceCounter, GetVersion, GetCurrentThreadId, InterlockedDecrement, InterlockedIncrement, VirtualQuery, WideCharToMultiByte, MultiByteToWideChar, lstrlenA, lstrcpynA, LoadLibraryExA, GetThreadLocale, GetStartupInfoA, GetProcAddress, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLastError, GetCommandLineA, FreeLibrary, FindFirstFileA, FindClose, ExitProcess, ExitThread, CreateThread, WriteFile, UnhandledExceptionFilter, SetFilePointer, SetEndOfFile, RtlUnwind, ReadFile, RaiseException, GetStdHandle, GetFileSize, GetFileType, CreateFileA, CloseHandle
    user32.dllGetKeyboardType, LoadStringA, MessageBoxA, CharNextA
    advapi32.dllRegQueryValueExA, RegOpenKeyExA, RegCloseKey
    oleaut32.dllSysFreeString, SysReAllocStringLen, SysAllocStringLen
    kernel32.dllTlsSetValue, TlsGetValue, LocalAlloc, GetModuleHandleA
    advapi32.dllRegSetValueExA, RegQueryValueExA, RegOpenKeyExA, RegFlushKey, RegDeleteValueA, RegCreateKeyExA, RegCloseKey, OpenProcessToken
    kernel32.dllWriteFile, WaitForSingleObject, VirtualQuery, TerminateThread, SuspendThread, SizeofResource, SetFilePointer, SetFileAttributesA, SetEvent, SetErrorMode, SetEndOfFile, ResumeThread, ResetEvent, ReadFile, LockResource, LoadResource, LoadLibraryA, LeaveCriticalSection, InitializeCriticalSection, GlobalUnlock, GlobalReAlloc, GlobalHandle, GlobalLock, GlobalFree, GlobalAlloc, GetVersionExA, GetTickCount, GetThreadLocale, GetStringTypeExA, GetStdHandle, GetProcAddress, GetPrivateProfileStringA, GetModuleHandleA, GetModuleFileNameA, GetLocaleInfoA, GetLocalTime, GetLastError, GetFullPathNameA, GetFileSize, GetExitCodeThread, GetEnvironmentVariableA, GetDriveTypeA, GetDiskFreeSpaceA, GetDateFormatA, GetCurrentThreadId, GetCurrentProcess, GetCPInfo, GetACP, FreeResource, InterlockedIncrement, InterlockedExchange, InterlockedDecrement, FormatMessageA, FindResourceA, FindFirstFileA, FindClose, FileTimeToLocalFileTime, FileTimeToDosDateTime, ExitThread, ExitProcess, EnumCalendarInfoA, EnterCriticalSection, DeleteFileA, DeleteCriticalSection, CreateThread, CreateMutexA, CreateFileA, CreateEventA, CopyFileA, CompareStringA, CloseHandle
    user32.dllPeekMessageA, MsgWaitForMultipleObjects, MessageBoxA, LoadStringA, GetSystemMetrics, CharNextA, CharUpperBuffA, CharToOemA
    wsock32.dllWSAStartup, WSAGetLastError, gethostbyname, socket, sendto, send, recv, ioctlsocket, inet_ntoa, inet_addr, htons, connect, closesocket
    kernel32.dllSleep
    shell32.dllShellExecuteA
    shell32.dllSHGetSpecialFolderPathA
    oleaut32.dllSafeArrayPtrOfIndex, SafeArrayGetUBound, SafeArrayGetLBound, SafeArrayCreate, VariantChangeType, VariantCopy, VariantClear, VariantInit

    Download Network PCAP: filteredfull

    TimestampSource PortDest PortSource IPDest IP
    Jan 24, 2024 19:02:29.547776937 CET5446653192.168.11.201.1.1.1
    Jan 24, 2024 19:02:29.662612915 CET53544661.1.1.1192.168.11.20
    Jan 24, 2024 19:08:33.607227087 CET6297953192.168.11.201.1.1.1
    Jan 24, 2024 19:08:33.720422029 CET53629791.1.1.1192.168.11.20
    TimestampSource IPDest IPTrans IDOP CodeNameTypeClassDNS over HTTPS
    Jan 24, 2024 19:02:29.547776937 CET192.168.11.201.1.1.10xc2a3Standard query (0)qzx.no-ip.infoA (IP address)IN (0x0001)false
    Jan 24, 2024 19:08:33.607227087 CET192.168.11.201.1.1.10xa919Standard query (0)qzx.no-ip.infoA (IP address)IN (0x0001)false
    TimestampSource IPDest IPTrans IDReply CodeNameCNameAddressTypeClassDNS over HTTPS
    Jan 24, 2024 19:02:29.662612915 CET1.1.1.1192.168.11.200xc2a3No error (0)qzx.no-ip.info0.0.0.0A (IP address)IN (0x0001)false
    Jan 24, 2024 19:08:33.720422029 CET1.1.1.1192.168.11.200xa919No error (0)qzx.no-ip.info0.0.0.0A (IP address)IN (0x0001)false
    0100200300400500s020406080100

    Click to jump to process

    0100200300400500s0.00510MB

    Click to jump to process

    • File
    • Registry
    • Network

    Click to dive into process behavior distribution

    Target ID:0
    Start time:19:02:28
    Start date:24/01/2024
    Path:C:\Users\user\Desktop\svchost.exe
    Wow64 process (32bit):true
    Commandline:C:\Users\user\Desktop\svchost.exe
    Imagebase:0x400000
    File size:130'048 bytes
    MD5 hash:A5437B874A27EF2DE31A29972F99F813
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Borland Delphi
    Reputation:low
    Has exited:true
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.
    There is hidden Windows Behavior. Click on Show Windows Behavior to show it.

    Target ID:2
    Start time:19:02:29
    Start date:24/01/2024
    Path:C:\Users\user\AppData\Roaming\Microsoft\svchost.exe
    Wow64 process (32bit):true
    Commandline:"C:\Users\user\AppData\Roaming\Microsoft\svchost.exe"
    Imagebase:0x400000
    File size:130'048 bytes
    MD5 hash:A5437B874A27EF2DE31A29972F99F813
    Has elevated privileges:true
    Has administrator privileges:true
    Programmed in:Borland Delphi
    Antivirus matches:
    • Detection: 100%, Avira
    • Detection: 100%, Joe Sandbox ML
    • Detection: 96%, ReversingLabs
    Reputation:low
    Has exited:false

    Target ID:3
    Start time:19:02:32
    Start date:24/01/2024
    Path:C:\Windows\System32\svchost.exe
    Wow64 process (32bit):false
    Commandline:C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s SmsRouter
    Imagebase:0x7ff76e630000
    File size:57'360 bytes
    MD5 hash:F586835082F632DC8D9404D83BC16316
    Has elevated privileges:true
    Has administrator privileges:false
    Programmed in:C, C++ or other language
    Reputation:moderate
    Has exited:true

    No disassembly