Analysis
-
max time kernel
142s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
03/10/2022, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe
Resource
win10v2004-20220901-en
General
-
Target
22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe
-
Size
185KB
-
MD5
7ba47942e3a561db346c230f7b53253a
-
SHA1
465c57f9a98b4689d00540653fb00971db32e36c
-
SHA256
22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77
-
SHA512
64a18dfc11ed04fc54fbd2fdb87aa31197b3b5fe93cd96c40f0bf39973e4d31e3ce353230207f8025e50d4d11e03b7c75eaa4bd73cb4cb16efce1bfbd598ad3a
-
SSDEEP
3072:SqJZXS7XlU7IHr7fVLMdNF22Qcjst9zqO2jT0AooNIqhpdLaehggC:9nX2U7IHr7dLMd62Q8gzqrzNIILD6gC
Malware Config
Signatures
-
Adds policy Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run svchost.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\Explorer\Run\20698 = "C:\\PROGRA~3\\LOCALS~1\\Temp\\ccsoqf.com" svchost.exe -
Executes dropped EXE 1 IoCs
pid Process 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe -
Loads dropped DLL 1 IoCs
pid Process 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2044 set thread context of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\PROGRA~3\LOCALS~1\Temp\ccsoqf.com svchost.exe -
Suspicious behavior: EnumeratesProcesses 16 IoCs
pid Process 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe -
Suspicious behavior: MapViewOfSection 2 IoCs
pid Process 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe -
Suspicious use of WriteProcessMemory 11 IoCs
description pid Process procid_target PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 2044 wrote to memory of 1148 2044 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 26 PID 1148 wrote to memory of 1656 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 27 PID 1148 wrote to memory of 1656 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 27 PID 1148 wrote to memory of 1656 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 27 PID 1148 wrote to memory of 1656 1148 22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe 27
Processes
-
C:\Users\Admin\AppData\Local\Temp\22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe"C:\Users\Admin\AppData\Local\Temp\22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe"C:\Users\Admin\AppData\Local\Temp\22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Windows\syswow64\svchost.exeC:\Windows\syswow64\svchost.exe3⤵
- Adds policy Run key to start application
- Drops file in Program Files directory
PID:1656
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe
Filesize185KB
MD57ba47942e3a561db346c230f7b53253a
SHA1465c57f9a98b4689d00540653fb00971db32e36c
SHA25622cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77
SHA51264a18dfc11ed04fc54fbd2fdb87aa31197b3b5fe93cd96c40f0bf39973e4d31e3ce353230207f8025e50d4d11e03b7c75eaa4bd73cb4cb16efce1bfbd598ad3a
-
\Users\Admin\AppData\Local\Temp\22cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77.exe
Filesize185KB
MD57ba47942e3a561db346c230f7b53253a
SHA1465c57f9a98b4689d00540653fb00971db32e36c
SHA25622cf2686e5889e5ce88aa31c3de31d923e63cc3fd86633e4e1b34c365d6fbc77
SHA51264a18dfc11ed04fc54fbd2fdb87aa31197b3b5fe93cd96c40f0bf39973e4d31e3ce353230207f8025e50d4d11e03b7c75eaa4bd73cb4cb16efce1bfbd598ad3a