Analysis
-
max time kernel
52s -
max time network
176s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
19/09/2022, 22:24
Static task
static1
Behavioral task
behavioral1
Sample
6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe
Resource
win10-20220812-en
General
-
Target
6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe
-
Size
2.6MB
-
MD5
bf599d1612d5de7ca8fdea16632a63b1
-
SHA1
80478e186dc8aaf482b9b197c651b8782e109a19
-
SHA256
6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674
-
SHA512
d0fabed7d489fdae53d538a842660280ab884ef3c051035018686f9cb989ab459dc7e663fc47d8d709a504ea0868050c4a44ce2e5fa5cbde7fe6e3e1ae16e187
-
SSDEEP
49152:/f5ogOEiHx51+56F16ogFaVN+we4Y28Fa+EQ7ujORpkLdZKMef6bL:/fKnxvhCoZV2pk4ujORpkLdUMemL
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
pid Process 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4536 schtasks.exe 4576 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4152 wrote to memory of 4536 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 68 PID 4152 wrote to memory of 4536 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 68 PID 4152 wrote to memory of 4536 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 68 PID 4152 wrote to memory of 1500 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 70 PID 4152 wrote to memory of 1500 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 70 PID 4152 wrote to memory of 1500 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 70 PID 4152 wrote to memory of 4576 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 72 PID 4152 wrote to memory of 4576 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 72 PID 4152 wrote to memory of 4576 4152 6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe 72
Processes
-
C:\Users\Admin\AppData\Local\Temp\6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe"C:\Users\Admin\AppData\Local\Temp\6ec2a7497a108851decf0497bee3dcef84a4dbcd43a699c531465a84f1412674.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Preview Handler Surrogate Host{G7D3J9G5J6D3S-K4F5K3S2I5-K7G3D2J7F4}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Hosts\prevhost.exe"2⤵
- Creates scheduled task(s)
PID:4536
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Preview Handler Surrogate Host{G7D3J9G5J6D3S-K4F5K3S2I5-K7G3D2J7F4}"2⤵PID:1500
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Preview Handler Surrogate Host{G7D3J9G5J6D3S-K4F5K3S2I5-K7G3D2J7F4}" /XML "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Hosts\757475834932488797"2⤵
- Creates scheduled task(s)
PID:4576
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5f189d9a2ccf04918859b8b384f5d1e62
SHA1473ff05f8b5b6809353f4212a83da4b8e8f9c704
SHA2565df8950404882376bf11f28acfdfb3082faf926b3497a600c86837d4ab16be36
SHA5126053881485ee55627d36738d144152cbf163b660817a48f0518988dbaff6763c950263115e0b7a68d988bd6b8f5fb23278c692933eb6dcd650e5b87f361a5b4a