Analysis
-
max time kernel
300s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
20/09/2022, 22:26
Static task
static1
Behavioral task
behavioral1
Sample
f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe
Resource
win10-20220812-en
General
-
Target
f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe
-
Size
2.2MB
-
MD5
954b7677eb947236a313bd1fb0407067
-
SHA1
77f87d4d8b12ba64b28cc8536ebf40dcec51f195
-
SHA256
f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891
-
SHA512
1c1bbf76f125b922c3da154a781dc7a59aafb57362dd8a642a43a26d1fbbad463c9330c4f77c658c634b5064312d0888993d7384da88f9b303ce894ef8db6f1f
-
SSDEEP
49152:2pS0zCZLl3G0u84DzZmg+rZhJQMJDh3IkyRusbg:2T2hDu84Bmhrz/JDh3IkyRr
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1512 2016 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3780 schtasks.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2016 wrote to memory of 3780 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 66 PID 2016 wrote to memory of 3780 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 66 PID 2016 wrote to memory of 3780 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 66 PID 2016 wrote to memory of 5048 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 68 PID 2016 wrote to memory of 5048 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 68 PID 2016 wrote to memory of 5048 2016 f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe 68
Processes
-
C:\Users\Admin\AppData\Local\Temp\f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe"C:\Users\Admin\AppData\Local\Temp\f9a994e6e546c540ddb863a31066a483c5d8fc21478348ecf6a60c7bc8a01891.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2016 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"2⤵
- Creates scheduled task(s)
PID:3780
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"2⤵PID:5048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2016 -s 6882⤵
- Program crash
PID:1512
-
-
C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exeC:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe1⤵PID:3412