Analysis
-
max time kernel
122s -
max time network
121s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
14-10-2021 06:30
Static task
static1
Behavioral task
behavioral1
Sample
a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe
Resource
win10-en-20210920
General
-
Target
a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe
-
Size
4.8MB
-
MD5
ee4ebaecca0009f0bd995c7d5d6ea7c1
-
SHA1
fa084f9d343b14cee9adb96e97b1821f83f777e0
-
SHA256
a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053
-
SHA512
373e58711b83d8e45edbaf1af732643ce31fd8f02da0884e0fecb4e8a2096eb0b6bfe99d8ef83a8f2a251769973a7e6cbbe16513a066eb39697a5a52a51cc66a
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
sihost.exepid process 416 sihost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
Processes:
a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exesihost.exepid process 2388 a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe 416 sihost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2924 schtasks.exe 1344 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exesihost.exepid process 2388 a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe 2388 a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe 416 sihost.exe 416 sihost.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exesihost.exedescription pid process target process PID 2388 wrote to memory of 2924 2388 a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe schtasks.exe PID 2388 wrote to memory of 2924 2388 a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe schtasks.exe PID 2388 wrote to memory of 2924 2388 a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe schtasks.exe PID 416 wrote to memory of 1344 416 sihost.exe schtasks.exe PID 416 wrote to memory of 1344 416 sihost.exe schtasks.exe PID 416 wrote to memory of 1344 416 sihost.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe"C:\Users\Admin\AppData\Local\Temp\a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exe"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exeC:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exe"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exeMD5
ee4ebaecca0009f0bd995c7d5d6ea7c1
SHA1fa084f9d343b14cee9adb96e97b1821f83f777e0
SHA256a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053
SHA512373e58711b83d8e45edbaf1af732643ce31fd8f02da0884e0fecb4e8a2096eb0b6bfe99d8ef83a8f2a251769973a7e6cbbe16513a066eb39697a5a52a51cc66a
-
C:\Users\Admin\AppData\Roaming\Microsoft\Network\sihost.exeMD5
ee4ebaecca0009f0bd995c7d5d6ea7c1
SHA1fa084f9d343b14cee9adb96e97b1821f83f777e0
SHA256a611c1e9dcec711840ea9295cb66ee04dc68f3a154e1abac99ffc88047464053
SHA512373e58711b83d8e45edbaf1af732643ce31fd8f02da0884e0fecb4e8a2096eb0b6bfe99d8ef83a8f2a251769973a7e6cbbe16513a066eb39697a5a52a51cc66a
-
memory/416-123-0x0000000000C20000-0x0000000000C21000-memory.dmpFilesize
4KB
-
memory/416-124-0x0000000000400000-0x0000000000B9B000-memory.dmpFilesize
7.6MB
-
memory/416-125-0x00000000001F0000-0x00000000001F1000-memory.dmpFilesize
4KB
-
memory/1344-126-0x0000000000000000-mapping.dmp
-
memory/2388-116-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/2388-117-0x0000000000400000-0x0000000000B9B000-memory.dmpFilesize
7.6MB
-
memory/2388-118-0x00000000001E0000-0x00000000001E1000-memory.dmpFilesize
4KB
-
memory/2924-119-0x0000000000000000-mapping.dmp