Analysis
-
max time kernel
163s -
max time network
208s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 19:35
Static task
static1
Behavioral task
behavioral1
Sample
c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe
Resource
win10v2004-20220812-en
General
-
Target
c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe
-
Size
119KB
-
MD5
96dace9d3bb37faac3c6e7a69b5c8400
-
SHA1
a88ce3449ba69ffd91e8d98e4807d13b48b532f9
-
SHA256
c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2
-
SHA512
1ba9357bdbcb81a80f2f1a2bcf5d60b1b2cf93de2a53a6cdabc1a761bcfa2f4bfdd90992a86a8e6f8501993ef8356f6379e308db3869ef90910afec88f15e6e8
-
SSDEEP
3072:gyZiGx5TFQYGsOpyg36Kuvmvp5+nkvqC3Q:gjsQYyjZnR
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3584 taskhost.exe 1760 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4988 set thread context of 5004 4988 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 80 PID 3584 set thread context of 1760 3584 taskhost.exe 84 -
Program crash 2 IoCs
pid pid_target Process procid_target 1772 4988 WerFault.exe 79 1748 3584 WerFault.exe 82 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4988 wrote to memory of 5004 4988 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 80 PID 4988 wrote to memory of 5004 4988 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 80 PID 4988 wrote to memory of 5004 4988 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 80 PID 4988 wrote to memory of 5004 4988 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 80 PID 4988 wrote to memory of 5004 4988 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 80 PID 5004 wrote to memory of 3584 5004 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 82 PID 5004 wrote to memory of 3584 5004 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 82 PID 5004 wrote to memory of 3584 5004 c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe 82 PID 3584 wrote to memory of 1760 3584 taskhost.exe 84 PID 3584 wrote to memory of 1760 3584 taskhost.exe 84 PID 3584 wrote to memory of 1760 3584 taskhost.exe 84 PID 3584 wrote to memory of 1760 3584 taskhost.exe 84 PID 3584 wrote to memory of 1760 3584 taskhost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe"C:\Users\Admin\AppData\Local\Temp\c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4988 -
C:\Users\Admin\AppData\Local\Temp\c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exeC:\Users\Admin\AppData\Local\Temp\c3812f7f14e5258d04ad92981ec7feaac2101b562ca09bbb3469d222524323e2.exe2⤵
- Suspicious use of WriteProcessMemory
PID:5004 -
C:\Users\Admin\taskhost.exeC:\Users\Admin\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3584 -
C:\Users\Admin\taskhost.exeC:\Users\Admin\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1760
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3584 -s 2964⤵
- Program crash
PID:1748
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4988 -s 3082⤵
- Program crash
PID:1772
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4988 -ip 49881⤵PID:2380
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 436 -p 3584 -ip 35841⤵PID:4380
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD5991b106297d8062b2e79d6d248025070
SHA16a82e6e37c272bf999ef38a0cf195992e8f40531
SHA256504c390ba9cd6db0b559b91cb26e8de364b23dc4d076446a08f39f68fb426c51
SHA5127b04ba25653e09cc5fff1225694dc2d64e50e109d8ce4c7d07a572e327b347d812ce78d8f9ba13834658adb0017a8c4ffe304189191a243e101dd7d993c4c8a6
-
Filesize
119KB
MD5991b106297d8062b2e79d6d248025070
SHA16a82e6e37c272bf999ef38a0cf195992e8f40531
SHA256504c390ba9cd6db0b559b91cb26e8de364b23dc4d076446a08f39f68fb426c51
SHA5127b04ba25653e09cc5fff1225694dc2d64e50e109d8ce4c7d07a572e327b347d812ce78d8f9ba13834658adb0017a8c4ffe304189191a243e101dd7d993c4c8a6
-
Filesize
119KB
MD5991b106297d8062b2e79d6d248025070
SHA16a82e6e37c272bf999ef38a0cf195992e8f40531
SHA256504c390ba9cd6db0b559b91cb26e8de364b23dc4d076446a08f39f68fb426c51
SHA5127b04ba25653e09cc5fff1225694dc2d64e50e109d8ce4c7d07a572e327b347d812ce78d8f9ba13834658adb0017a8c4ffe304189191a243e101dd7d993c4c8a6