Analysis
-
max time kernel
291s -
max time network
182s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
16-09-2022 22:23
Static task
static1
Behavioral task
behavioral1
Sample
acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe
Resource
win10-20220812-en
General
-
Target
acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe
-
Size
2.2MB
-
MD5
b0e2f4f332576bc0518721f042beb797
-
SHA1
e79e20983ad2a8f68327750ce790e84cc3ebd47d
-
SHA256
acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63
-
SHA512
95198982892f9767e490a3428302a8be84fa8ea03cbe2d7c5b7c214f3fcd42770aa24c69271f038378223914a059d617264ae94f327601faa007ef139e96e7fa
-
SSDEEP
49152:9MSlDi3ntoJ4K8vq9cFEB5dVuxq4kaw+Qui3J7uJDgkI:5lD85qIEBD7awKW7uJDg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4388 eventvwr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
pid Process 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 4388 eventvwr.exe 4388 eventvwr.exe 4388 eventvwr.exe 4388 eventvwr.exe 4388 eventvwr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 3564 2704 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4108 schtasks.exe 3436 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 4388 eventvwr.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2704 wrote to memory of 4108 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 67 PID 2704 wrote to memory of 4108 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 67 PID 2704 wrote to memory of 4108 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 67 PID 2704 wrote to memory of 4820 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 68 PID 2704 wrote to memory of 4820 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 68 PID 2704 wrote to memory of 4820 2704 acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe 68 PID 4388 wrote to memory of 3436 4388 eventvwr.exe 73 PID 4388 wrote to memory of 3436 4388 eventvwr.exe 73 PID 4388 wrote to memory of 3436 4388 eventvwr.exe 73
Processes
-
C:\Users\Admin\AppData\Local\Temp\acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe"C:\Users\Admin\AppData\Local\Temp\acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2704 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"2⤵
- Creates scheduled task(s)
PID:4108
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"2⤵PID:4820
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 6882⤵
- Program crash
PID:3564
-
-
C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exeC:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4388 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"2⤵
- Creates scheduled task(s)
PID:3436
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD5b0e2f4f332576bc0518721f042beb797
SHA1e79e20983ad2a8f68327750ce790e84cc3ebd47d
SHA256acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63
SHA51295198982892f9767e490a3428302a8be84fa8ea03cbe2d7c5b7c214f3fcd42770aa24c69271f038378223914a059d617264ae94f327601faa007ef139e96e7fa
-
Filesize
2.2MB
MD5b0e2f4f332576bc0518721f042beb797
SHA1e79e20983ad2a8f68327750ce790e84cc3ebd47d
SHA256acec2cb8ba414dee716ba5a90908121d64482a56eb2e8da78f7bf62f25846c63
SHA51295198982892f9767e490a3428302a8be84fa8ea03cbe2d7c5b7c214f3fcd42770aa24c69271f038378223914a059d617264ae94f327601faa007ef139e96e7fa