Analysis

  • max time kernel
    148s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01/10/2022, 22:10

General

  • Target

    d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe

  • Size

    96KB

  • MD5

    6c8b101fbcb05905f0202626ff28fd6d

  • SHA1

    4c82ba03b1aecf885758dc15aab1c22d8215983b

  • SHA256

    d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825

  • SHA512

    ec3d6d8fb1020a7b2a9fb3d08cb22a1458cdab8b97536348e4489e358cde5d78bfed9d1cd6f6e4e53b487b1f008285e35adaee3b4f2d1603b517be20ce87bcd8

  • SSDEEP

    1536:SCDllMidtJ6jDPcjODN1uv9IH0jZQoQWbgKjrLTU699p/:nZtJqQ/QoLbzjrft1/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe
    "C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2384
    • C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe
      C:\Users\Admin\AppData\Local\Temp\d6c428f9e97b31028b939d6bdb80da38de497cdb6dc2d6fd743d91c5d5ef8825.exe
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2304
      • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:5096
        • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1472
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5096 -s 300
          4⤵
          • Program crash
          PID:3888
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2384 -s 288
      2⤵
      • Program crash
      PID:3128
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2384 -ip 2384
    1⤵
      PID:1292
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 412 -p 5096 -ip 5096
      1⤵
        PID:452

      Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

              Filesize

              96KB

              MD5

              2ed1baba23b2fdc8c8343ffb63adc145

              SHA1

              b881f71f83fcf7c12ec5cc9533d60bf4cccf2581

              SHA256

              30e68fbb677051ea3855d129b1c0ec9f75f14048c50be92a7a00a43d86d24a42

              SHA512

              c0cd96b723721ed2019999e830a3b4ac56c673900699ebccba3a79577de76b89774bacc23d4289f17eac425f1f27469a1e8b80e7439c808dc4cb44984709e6a1

            • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

              Filesize

              96KB

              MD5

              2ed1baba23b2fdc8c8343ffb63adc145

              SHA1

              b881f71f83fcf7c12ec5cc9533d60bf4cccf2581

              SHA256

              30e68fbb677051ea3855d129b1c0ec9f75f14048c50be92a7a00a43d86d24a42

              SHA512

              c0cd96b723721ed2019999e830a3b4ac56c673900699ebccba3a79577de76b89774bacc23d4289f17eac425f1f27469a1e8b80e7439c808dc4cb44984709e6a1

            • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

              Filesize

              96KB

              MD5

              2ed1baba23b2fdc8c8343ffb63adc145

              SHA1

              b881f71f83fcf7c12ec5cc9533d60bf4cccf2581

              SHA256

              30e68fbb677051ea3855d129b1c0ec9f75f14048c50be92a7a00a43d86d24a42

              SHA512

              c0cd96b723721ed2019999e830a3b4ac56c673900699ebccba3a79577de76b89774bacc23d4289f17eac425f1f27469a1e8b80e7439c808dc4cb44984709e6a1

            • memory/1472-142-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/1472-143-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/1472-145-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/2304-135-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/2304-134-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/2304-133-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB

            • memory/2304-144-0x0000000000400000-0x0000000000429000-memory.dmp

              Filesize

              164KB