Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
01/10/2022, 22:10
Static task
static1
Behavioral task
behavioral1
Sample
d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe
Resource
win10v2004-20220901-en
General
-
Target
d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe
-
Size
96KB
-
MD5
6c8b101fbcb05905f0202626ff28fd6d
-
SHA1
4c82ba03b1aecf885758dc15aab1c22d8215983b
-
SHA256
d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825
-
SHA512
ec3d6d8fb1020a7b2a9fb3d08cb22a1458cdab8b97536348e4489e358cde5d78bfed9d1cd6f6e4e53b487b1f008285e35adaee3b4f2d1603b517be20ce87bcd8
-
SSDEEP
1536:SCDllMidtJ6jDPcjODN1uv9IH0jZQoQWbgKjrLTU699p/:nZtJqQ/QoLbzjrft1/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 5096 taskhost.exe 1472 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-929662420-1054238289-2961194603-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2384 set thread context of 2304 2384 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 82 PID 5096 set thread context of 1472 5096 taskhost.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 3888 5096 WerFault.exe 85 3128 2384 WerFault.exe 81 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2384 wrote to memory of 2304 2384 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 82 PID 2384 wrote to memory of 2304 2384 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 82 PID 2384 wrote to memory of 2304 2384 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 82 PID 2384 wrote to memory of 2304 2384 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 82 PID 2384 wrote to memory of 2304 2384 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 82 PID 2304 wrote to memory of 5096 2304 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 85 PID 2304 wrote to memory of 5096 2304 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 85 PID 2304 wrote to memory of 5096 2304 d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe 85 PID 5096 wrote to memory of 1472 5096 taskhost.exe 86 PID 5096 wrote to memory of 1472 5096 taskhost.exe 86 PID 5096 wrote to memory of 1472 5096 taskhost.exe 86 PID 5096 wrote to memory of 1472 5096 taskhost.exe 86 PID 5096 wrote to memory of 1472 5096 taskhost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe"C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exeC:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe2⤵
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:5096 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1472
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 3004⤵
- Program crash
PID:3888
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 2882⤵
- Program crash
PID:3128
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2384 -ip 23841⤵PID:1292
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5096 -ip 50961⤵PID:452
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD52ed1baba23b2fdc8c8343ffb63adc145
SHA1b881f71f83fcf7c12ec5cc9533d60bf4cccf2581
SHA25630e68fbb677051ea3855d129b1c0ec9f75f14048c50be92a7a00a43d86d24a42
SHA512c0cd96b723721ed2019999e830a3b4ac56c673900699ebccba3a79577de76b89774bacc23d4289f17eac425f1f27469a1e8b80e7439c808dc4cb44984709e6a1
-
Filesize
96KB
MD52ed1baba23b2fdc8c8343ffb63adc145
SHA1b881f71f83fcf7c12ec5cc9533d60bf4cccf2581
SHA25630e68fbb677051ea3855d129b1c0ec9f75f14048c50be92a7a00a43d86d24a42
SHA512c0cd96b723721ed2019999e830a3b4ac56c673900699ebccba3a79577de76b89774bacc23d4289f17eac425f1f27469a1e8b80e7439c808dc4cb44984709e6a1
-
Filesize
96KB
MD52ed1baba23b2fdc8c8343ffb63adc145
SHA1b881f71f83fcf7c12ec5cc9533d60bf4cccf2581
SHA25630e68fbb677051ea3855d129b1c0ec9f75f14048c50be92a7a00a43d86d24a42
SHA512c0cd96b723721ed2019999e830a3b4ac56c673900699ebccba3a79577de76b89774bacc23d4289f17eac425f1f27469a1e8b80e7439c808dc4cb44984709e6a1