Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 00:35
Static task
static1
Behavioral task
behavioral1
Sample
de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe
Resource
win10v2004-20220812-en
General
-
Target
de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe
-
Size
119KB
-
MD5
661ce78d9b514ad5a0adebed616ebcfa
-
SHA1
15a4381add58351e61f4e5da24f3d773eef9674a
-
SHA256
de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1
-
SHA512
ececad313d5ac17b0c6a08d9872bc36737b32c6bcccc3fa4b6d9ca3d3aac9961dbc85221124b5ca3c574409068b5afe8e8246bb00d07b20093b74d3d280f70be
-
SSDEEP
1536:0eNXtwl1+7Pcn4g5ziBgmMYwA2yqULg1HJulcvpqWOkKA4YLg+x6J289dT+KBNZR:0u3g5ziUYwAs1glcx+7v3jT+8Xp
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1616 taskhost.exe 616 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1704 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 1704 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1928 set thread context of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1616 set thread context of 616 1616 taskhost.exe 28 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1928 wrote to memory of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1928 wrote to memory of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1928 wrote to memory of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1928 wrote to memory of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1928 wrote to memory of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1928 wrote to memory of 1704 1928 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 26 PID 1704 wrote to memory of 1616 1704 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 27 PID 1704 wrote to memory of 1616 1704 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 27 PID 1704 wrote to memory of 1616 1704 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 27 PID 1704 wrote to memory of 1616 1704 de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe 27 PID 1616 wrote to memory of 616 1616 taskhost.exe 28 PID 1616 wrote to memory of 616 1616 taskhost.exe 28 PID 1616 wrote to memory of 616 1616 taskhost.exe 28 PID 1616 wrote to memory of 616 1616 taskhost.exe 28 PID 1616 wrote to memory of 616 1616 taskhost.exe 28 PID 1616 wrote to memory of 616 1616 taskhost.exe 28
Processes
-
C:\Users\Admin\AppData\Local\Temp\de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe"C:\Users\Admin\AppData\Local\Temp\de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exeC:\Users\Admin\AppData\Local\Temp\de276d97e620d952a33042649df284f9a3c1eade5510b454f3ba36edc08eb3d1.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:616
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD51826a223a8b9707e84029d8e583a3512
SHA1b9db00861c77915cbff6a236d99d98bdcc96cb3c
SHA256d297cd6857514e95b56e48bbc505cda47fd9900c18560a397b97e1b0c4808dc3
SHA512120a24f8a821e963199a3905bfbacee0cffaecaa62966e03ec6e06a2c5f35e89a2bde5a0116802de4bb93e871c937b483ad13cfa04f83530a448388d6cbe880a
-
Filesize
119KB
MD51826a223a8b9707e84029d8e583a3512
SHA1b9db00861c77915cbff6a236d99d98bdcc96cb3c
SHA256d297cd6857514e95b56e48bbc505cda47fd9900c18560a397b97e1b0c4808dc3
SHA512120a24f8a821e963199a3905bfbacee0cffaecaa62966e03ec6e06a2c5f35e89a2bde5a0116802de4bb93e871c937b483ad13cfa04f83530a448388d6cbe880a
-
Filesize
119KB
MD51826a223a8b9707e84029d8e583a3512
SHA1b9db00861c77915cbff6a236d99d98bdcc96cb3c
SHA256d297cd6857514e95b56e48bbc505cda47fd9900c18560a397b97e1b0c4808dc3
SHA512120a24f8a821e963199a3905bfbacee0cffaecaa62966e03ec6e06a2c5f35e89a2bde5a0116802de4bb93e871c937b483ad13cfa04f83530a448388d6cbe880a
-
Filesize
119KB
MD51826a223a8b9707e84029d8e583a3512
SHA1b9db00861c77915cbff6a236d99d98bdcc96cb3c
SHA256d297cd6857514e95b56e48bbc505cda47fd9900c18560a397b97e1b0c4808dc3
SHA512120a24f8a821e963199a3905bfbacee0cffaecaa62966e03ec6e06a2c5f35e89a2bde5a0116802de4bb93e871c937b483ad13cfa04f83530a448388d6cbe880a
-
Filesize
119KB
MD51826a223a8b9707e84029d8e583a3512
SHA1b9db00861c77915cbff6a236d99d98bdcc96cb3c
SHA256d297cd6857514e95b56e48bbc505cda47fd9900c18560a397b97e1b0c4808dc3
SHA512120a24f8a821e963199a3905bfbacee0cffaecaa62966e03ec6e06a2c5f35e89a2bde5a0116802de4bb93e871c937b483ad13cfa04f83530a448388d6cbe880a