Analysis
-
max time kernel
291s -
max time network
180s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
25/09/2022, 10:18
Static task
static1
Behavioral task
behavioral1
Sample
661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe
Resource
win10-20220812-en
General
-
Target
661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe
-
Size
2.2MB
-
MD5
59af86112d909203945c2c7c90619ea5
-
SHA1
4620295a416ee9d529c301cc8b77835dd4d99734
-
SHA256
661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4
-
SHA512
7f8c92a647a62b2755d12231f862b76ee2c28c61bd642c84a75d0c8cccc3663e6dd419c06817dc12261d95d763a311d152b73d20442bb4f957b862c99f6b5ef3
-
SSDEEP
49152:Dx5aZlC/gpB3lGqVUOCL4k1OimoZ37Uim+gfzSxBcsGH/FBnRx:DbaZwEBVGqVUOq4qOfilgbSzXGfBx
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 436 eventvwr.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 7 IoCs
pid Process 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 436 eventvwr.exe 436 eventvwr.exe 436 eventvwr.exe 436 eventvwr.exe 436 eventvwr.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 4304 2496 WerFault.exe 65 -
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4628 schtasks.exe 1388 schtasks.exe 4136 schtasks.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 436 eventvwr.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2496 wrote to memory of 4628 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 66 PID 2496 wrote to memory of 4628 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 66 PID 2496 wrote to memory of 4628 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 66 PID 2496 wrote to memory of 2340 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 68 PID 2496 wrote to memory of 2340 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 68 PID 2496 wrote to memory of 2340 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 68 PID 2496 wrote to memory of 1388 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 70 PID 2496 wrote to memory of 1388 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 70 PID 2496 wrote to memory of 1388 2496 661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe 70 PID 436 wrote to memory of 4136 436 eventvwr.exe 75 PID 436 wrote to memory of 4136 436 eventvwr.exe 75 PID 436 wrote to memory of 4136 436 eventvwr.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe"C:\Users\Admin\AppData\Local\Temp\661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"2⤵
- Creates scheduled task(s)
PID:4628
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Event Viewer Snap-in Launcher (29762912)"2⤵PID:2340
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Event Viewer Snap-in Launcher (29762912)" /XML "C:\Users\Admin\AppData\Roaming\EventViewer\tfnme73946158264.tmp"2⤵
- Creates scheduled task(s)
PID:1388
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2496 -s 3242⤵
- Program crash
PID:4304
-
-
C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exeC:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe1⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:436 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Event Viewer Snap-in Launcher (29762912)" /tr "C:\Users\Admin\AppData\Roaming\EventViewer\eventvwr.exe"2⤵
- Creates scheduled task(s)
PID:4136
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2.2MB
MD559af86112d909203945c2c7c90619ea5
SHA14620295a416ee9d529c301cc8b77835dd4d99734
SHA256661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4
SHA5127f8c92a647a62b2755d12231f862b76ee2c28c61bd642c84a75d0c8cccc3663e6dd419c06817dc12261d95d763a311d152b73d20442bb4f957b862c99f6b5ef3
-
Filesize
2.2MB
MD559af86112d909203945c2c7c90619ea5
SHA14620295a416ee9d529c301cc8b77835dd4d99734
SHA256661e7fa1d1e6d6f6075e778a37860bda4bbe9c407b1dc41298b1fc4f5abea2c4
SHA5127f8c92a647a62b2755d12231f862b76ee2c28c61bd642c84a75d0c8cccc3663e6dd419c06817dc12261d95d763a311d152b73d20442bb4f957b862c99f6b5ef3
-
Filesize
1KB
MD551ecf66b058a5e4079008012d8619179
SHA1383c7a40e2e35aba5cbd5b0788ffd4eca6633c87
SHA256c5db46548c03324cb73d2aa98d9c733acd096e6d7c4b5e3839476d0aeea42c32
SHA512505c390972f1dd9d6caa61c9ca40d232b20610fd1c2c8743639baf4feef0f129fcf254c07a09cb26051dec551329e53b8b3735f5673ea9a508fe8ee8cfdb3aa8