Analysis
-
max time kernel
81s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 07:49
Static task
static1
Behavioral task
behavioral1
Sample
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe
Resource
win10v2004-20220901-en
General
-
Target
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe
-
Size
375KB
-
MD5
4f099eeccc18d58de8fd9f85a990653d
-
SHA1
33706d7aa2e9d6c6bdde355a01a21baf887837fa
-
SHA256
f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
-
SHA512
474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860
-
SSDEEP
6144:+BudLvxoeilwc4ybTNaaaOX99xERXmJqan0lS74MVdUfsUPxOBqwqUdeR2fSm2Hy:+Gfkwc4ybTNaaaqvE9mJxn0e4kUfsUZM
Malware Config
Signatures
-
Drops file in Drivers directory 3 IoCs
description ioc Process File created C:\Windows\SysWOW64\drivers\svchost.exe f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe File opened for modification C:\Windows\SysWOW64\drivers\svchost.exe f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe File opened for modification C:\Windows\SysWOW64\drivers\svchost.exe svchost.exe -
Executes dropped EXE 2 IoCs
pid Process 2204 svchost.exe 3932 svchost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1884 set thread context of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 2204 set thread context of 3932 2204 svchost.exe 86 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 2204 svchost.exe 2204 svchost.exe -
Suspicious use of WriteProcessMemory 26 IoCs
description pid Process procid_target PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 1884 wrote to memory of 3952 1884 f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe 84 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86 PID 2204 wrote to memory of 3932 2204 svchost.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe"C:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exeC:\Users\Admin\AppData\Local\Temp\f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9.exe2⤵
- Drops file in Drivers directory
PID:3952
-
-
C:\Windows\SysWOW64\drivers\svchost.exeC:\Windows\SysWOW64\drivers\svchost.exe1⤵
- Drops file in Drivers directory
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Windows\SysWOW64\drivers\svchost.exeC:\Windows\SysWOW64\drivers\svchost.exe2⤵
- Executes dropped EXE
PID:3932
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD54f099eeccc18d58de8fd9f85a990653d
SHA133706d7aa2e9d6c6bdde355a01a21baf887837fa
SHA256f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
SHA512474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860
-
Filesize
375KB
MD54f099eeccc18d58de8fd9f85a990653d
SHA133706d7aa2e9d6c6bdde355a01a21baf887837fa
SHA256f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
SHA512474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860
-
Filesize
375KB
MD54f099eeccc18d58de8fd9f85a990653d
SHA133706d7aa2e9d6c6bdde355a01a21baf887837fa
SHA256f46e6d696396a45374736d7794d16430bc3a5dc224b62e26155201ac39cf5ac9
SHA512474f630184552ba3a1b791da23c27eb9115e3c751c14a372d015f17f816e0f7fd80011282b1c2860b37e1bf4ab905a2b29251d7c5f7e5ba139fce8c807e49860