Analysis
-
max time kernel
44s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
20-10-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe
Resource
win10v2004-20220901-en
General
-
Target
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe
-
Size
375KB
-
MD5
4f099eeccc18d58de8fd9f85a990653d
-
SHA1
33706d7aa2e9d6c6bdde355a01a21baf887837fa
-
SHA256
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
-
SHA512
474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860
-
SSDEEP
6144:+BudLvxoeilwc4ybTNaaaOX99xERXmJqan0lS74MVdUfsUPxOBqwqUdeR2fSm2Hy:+Gfkwc4ybTNaaaqvE9mJxn0e4kUfsUZM
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svchost.exe f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe File opened for modification C:\Windows\SysWOW64\drivers\svchost.exe f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe File opened for modification C:\Windows\SysWOW64\drivers\svchost.exe svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 552 svchost.exe 856 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 828 set thread context of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 552 set thread context of 856 552 svchost.exe 29 -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 552 svchost.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 828 wrote to memory of 976 828 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 27 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29 PID 552 wrote to memory of 856 552 svchost.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe"C:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exeC:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe2⤵
- Drops file in Drivers directory
PID:976
-
-
C:\Windows\SysWOW64\drivers\svchost.exeC:\Windows\SysWOW64\drivers\svchost.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\SysWOW64\drivers\svchost.exeC:\Windows\SysWOW64\drivers\svchost.exe2⤵
- Executes dropped EXE
PID:856
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD54f099eeccc18d58de8fd9f85a990653d
SHA133706d7aa2e9d6c6bdde355a01a21baf887837fa
SHA256f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
SHA512474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860
-
Filesize
375KB
MD54f099eeccc18d58de8fd9f85a990653d
SHA133706d7aa2e9d6c6bdde355a01a21baf887837fa
SHA256f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
SHA512474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860
-
Filesize
375KB
MD54f099eeccc18d58de8fd9f85a990653d
SHA133706d7aa2e9d6c6bdde355a01a21baf887837fa
SHA256f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
SHA512474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860