Analysis
-
max time kernel
150s -
max time network
130s -
platform
windows10_x64 -
resource
win10v20210410 -
submitted
05-05-2021 11:43
Static task
static1
Behavioral task
behavioral1
Sample
taskhost.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
taskhost.exe
Resource
win10v20210410
General
-
Target
taskhost.exe
-
Size
2.8MB
-
MD5
7f6b8e103f0a42615d90a2b7ad862135
-
SHA1
095d2bef8afc9a657cb0dfbe9e95ae467a7364d0
-
SHA256
51edeab1acc8739d6e419b59c1ea6c1e1a8e783d1a3852729b35781ddb008639
-
SHA512
b058baa67cce6631bb4937b8df81ac42fbe2955c1c43723b136a74378dece449dcd50d0c7ea3d2b9817939e1126767c3935d12dde7863edcb66d1bd56675ca83
Malware Config
Signatures
-
Processes:
resource yara_rule behavioral2/memory/3260-119-0x0000000000400000-0x0000000000A16000-memory.dmp upx behavioral2/memory/3260-120-0x0000000000400000-0x0000000000A16000-memory.dmp upx -
Drops startup file 1 IoCs
Processes:
wscript.exedescription ioc process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UkeplxjeiD.url wscript.exe -
Suspicious use of SetThreadContext 17 IoCs
Processes:
taskhost.exetaskhost.exedescription pid process target process PID 1852 set thread context of 2528 1852 taskhost.exe taskhost.exe PID 2528 set thread context of 3260 2528 taskhost.exe notepad.exe PID 2528 set thread context of 1580 2528 taskhost.exe notepad.exe PID 2528 set thread context of 2160 2528 taskhost.exe notepad.exe PID 2528 set thread context of 3376 2528 taskhost.exe notepad.exe PID 2528 set thread context of 4040 2528 taskhost.exe notepad.exe PID 2528 set thread context of 900 2528 taskhost.exe notepad.exe PID 2528 set thread context of 1448 2528 taskhost.exe notepad.exe PID 2528 set thread context of 3368 2528 taskhost.exe notepad.exe PID 2528 set thread context of 2420 2528 taskhost.exe notepad.exe PID 2528 set thread context of 3700 2528 taskhost.exe notepad.exe PID 2528 set thread context of 3752 2528 taskhost.exe notepad.exe PID 2528 set thread context of 3600 2528 taskhost.exe notepad.exe PID 2528 set thread context of 2244 2528 taskhost.exe notepad.exe PID 2528 set thread context of 3120 2528 taskhost.exe notepad.exe PID 2528 set thread context of 2100 2528 taskhost.exe notepad.exe PID 2528 set thread context of 200 2528 taskhost.exe notepad.exe -
Program crash 16 IoCs
Processes:
WerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exeWerFault.exepid pid_target process target process 3704 3260 WerFault.exe notepad.exe 3948 1580 WerFault.exe notepad.exe 2584 2160 WerFault.exe notepad.exe 2868 3376 WerFault.exe notepad.exe 1316 4040 WerFault.exe notepad.exe 4016 900 WerFault.exe notepad.exe 416 1448 WerFault.exe notepad.exe 2656 3368 WerFault.exe notepad.exe 2148 2420 WerFault.exe notepad.exe 3340 3700 WerFault.exe notepad.exe 3556 3752 WerFault.exe notepad.exe 1392 3600 WerFault.exe notepad.exe 3440 2244 WerFault.exe notepad.exe 1952 3120 WerFault.exe notepad.exe 1112 2100 WerFault.exe notepad.exe 1516 200 WerFault.exe notepad.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
Processes:
taskhost.exepid process 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe 2528 taskhost.exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
taskhost.exedescription pid process Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe Token: SeDebugPrivilege 2528 taskhost.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
taskhost.exepid process 1852 taskhost.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
taskhost.exetaskhost.execmd.exedescription pid process target process PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 1852 wrote to memory of 2528 1852 taskhost.exe taskhost.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3260 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 1580 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 2160 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4060 2528 taskhost.exe cmd.exe PID 2528 wrote to memory of 4060 2528 taskhost.exe cmd.exe PID 2528 wrote to memory of 4060 2528 taskhost.exe cmd.exe PID 4060 wrote to memory of 1928 4060 cmd.exe wscript.exe PID 4060 wrote to memory of 1928 4060 cmd.exe wscript.exe PID 4060 wrote to memory of 1928 4060 cmd.exe wscript.exe PID 2528 wrote to memory of 4060 2528 taskhost.exe cmd.exe PID 2528 wrote to memory of 4060 2528 taskhost.exe cmd.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 3376 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 4040 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe PID 2528 wrote to memory of 900 2528 taskhost.exe notepad.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\taskhost.exe"C:\Users\Admin\AppData\Local\Temp\taskhost.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3260 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1580 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2160 -s 1804⤵
- Program crash
-
C:\Windows\SysWOW64\cmd.execmd.exe /C WScript "C:\ProgramData\lSuRugDFHR\r.vbs"3⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\wscript.exeWScript "C:\ProgramData\lSuRugDFHR\r.vbs"4⤵
- Drops startup file
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3376 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 4040 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 900 -s 1124⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1448 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3368 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2420 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3700 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3752 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3600 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2244 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 3120 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 2100 -s 1804⤵
- Program crash
-
C:\Windows\notepad.exe"C:\Windows\notepad.exe" -c "C:\ProgramData\lSuRugDFHR\cfgi"3⤵
-
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 200 -s 1804⤵
- Program crash
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\lSuRugDFHR\r.vbsMD5
aaeac492102e79fb3268ee27bbb46cac
SHA1240f554c3ea020167019406c36e06a68c4cc1b63
SHA2562c914731f4e36b3601bc30706bb1a2339a1970af9d87630886208a1ebef04fb4
SHA5121b4c3a755fc84d26a60dce9ac6a112de999d3c17fd48ec749d6003496753c7eb2e037f57885bf810f2ecb0e18b00ca0da49ae7b19f337d50e3a5aa7b2de462a5
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\UkeplxjeiD.urlMD5
35015db45f574eb0c6202efeef2c0dcc
SHA16fcd6a0cc15a21477bf99f05add9015eb7e11aa6
SHA256e43d7feb7648b9b5ee2bed19aeb990818429580dfd731106f25caade1f485f5e
SHA512d145ec6ee6ce970dc4397305fe4f5ee7addf2e43b0e10b6f3e87eb56fc5cce603e2b2ad6c534dda082e756e423cb79e0a96564df86ecf86ebe464f40fb891612
-
memory/200-200-0x0000000000A14AA0-mapping.dmp
-
memory/900-151-0x0000000000A14AA0-mapping.dmp
-
memory/1448-156-0x0000000000A14AA0-mapping.dmp
-
memory/1580-126-0x0000000000A14AA0-mapping.dmp
-
memory/1928-135-0x0000000000000000-mapping.dmp
-
memory/2100-196-0x0000000000A14AA0-mapping.dmp
-
memory/2160-131-0x0000000000A14AA0-mapping.dmp
-
memory/2244-186-0x0000000000A14AA0-mapping.dmp
-
memory/2420-166-0x0000000000A14AA0-mapping.dmp
-
memory/2528-118-0x0000000000400000-0x00000000005D4000-memory.dmpFilesize
1.8MB
-
memory/2528-117-0x0000000000404470-mapping.dmp
-
memory/2528-116-0x0000000000400000-0x00000000005D4000-memory.dmpFilesize
1.8MB
-
memory/3120-191-0x0000000000A14AA0-mapping.dmp
-
memory/3260-120-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/3260-119-0x0000000000400000-0x0000000000A16000-memory.dmpFilesize
6.1MB
-
memory/3260-121-0x0000000000A14AA0-mapping.dmp
-
memory/3368-161-0x0000000000A14AA0-mapping.dmp
-
memory/3376-141-0x0000000000A14AA0-mapping.dmp
-
memory/3600-181-0x0000000000A14AA0-mapping.dmp
-
memory/3700-171-0x0000000000A14AA0-mapping.dmp
-
memory/3752-176-0x0000000000A14AA0-mapping.dmp
-
memory/4040-146-0x0000000000A14AA0-mapping.dmp
-
memory/4060-137-0x0000000003770000-0x0000000003944000-memory.dmpFilesize
1.8MB
-
memory/4060-134-0x0000000000000000-mapping.dmp