Analysis
-
max time kernel
175s -
max time network
189s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 12:49
Static task
static1
Behavioral task
behavioral1
Sample
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
Resource
win10v2004-20220812-en
General
-
Target
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe
-
Size
226KB
-
MD5
4a4b2303320a0ba42476b20ed3badee0
-
SHA1
c7754ad51ca9acd1eb630747002803766659d483
-
SHA256
b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591
-
SHA512
d469d56a12a7baa4a411984fab994dc4e00d58fc27b0f3418d4cdb59dada7497ef9e44ddd94ee4065994103778b72f0c9cddb3b112f44132774391f87b184b09
-
SSDEEP
6144:6yH7xOc6H5c6HcT66vlmq9WIZOAIpl+4vcHz9ek6Rz6oSarz6Bmzpf7g8:6aXZNID3Ueko6oSHUV7g8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1580 svchost.exe 4880 svchost.exe -
Drops file in Program Files directory 25 IoCs
description ioc Process File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe svchost.exe -
Drops file in Windows directory 1 IoCs
description ioc Process File created C:\Windows\svchost.exe b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 3324 wrote to memory of 1580 3324 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 83 PID 3324 wrote to memory of 1580 3324 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 83 PID 3324 wrote to memory of 1580 3324 b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\b98b660aa7aed9befb7b5e1a4910846982c237bcee6ababc95640ce962f5a591.exe"2⤵
- Executes dropped EXE
PID:1580
-
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:4880
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
35KB
MD5eca2fcc8d70a27b1b939835734563866
SHA19ad9bc1416ca7c0a761ca734ebc105541d2fe8ab
SHA256134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17
SHA5120acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c
-
Filesize
35KB
MD5eca2fcc8d70a27b1b939835734563866
SHA19ad9bc1416ca7c0a761ca734ebc105541d2fe8ab
SHA256134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17
SHA5120acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c
-
Filesize
35KB
MD5eca2fcc8d70a27b1b939835734563866
SHA19ad9bc1416ca7c0a761ca734ebc105541d2fe8ab
SHA256134222685b817ebf637298844addc556014bcf7c5fd124d107957f4aa7039c17
SHA5120acc53f00ed2e5ab0ecab92bb6e903f30cc70af23c42e6f3b51c264f12bdf37864a1ad490e9ec44825789d922680e5e6109892d98ae9dfd8f00a3fbbd5c6167c