Analysis

  • max time kernel
    147s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    23-11-2022 12:03

General

  • Target

    a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4.exe

  • Size

    3.4MB

  • MD5

    0349e342af5e3cf743ce2175323ac62b

  • SHA1

    e211bcd37e233a07324419ca908f23c0cbfe658f

  • SHA256

    a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4

  • SHA512

    1b4c84c96fc2391916715ebdaf4634b0c1b123e075f5ade99ccf903406e48605c6b5a4d29c7cc15585866604ae1d97af6813a25155be1ccb95e69bb8c2967374

  • SSDEEP

    98304:wivAmOlajnlMgF1X82Z+TArRschrFNyQFLOAkGkzdnEVomFHKnPe:w/KlMgDvrFNyQFLOyomFHKnPe

Score
8/10

Malware Config

Signatures

  • Blocklisted process makes network request 14 IoCs
  • Executes dropped EXE 2 IoCs
  • Suspicious use of SetThreadContext 3 IoCs
  • Creates scheduled task(s) 1 TTPs 3 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4.exe
    "C:\Users\Admin\AppData\Local\Temp\a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\SysWOW64\schtasks.exe
      schtasks /Create /sc minute /mo 1 /tn "System" /tr C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
      2⤵
      • Creates scheduled task(s)
      PID:940
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe
      2⤵
      • Blocklisted process makes network request
      PID:1992
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {8141CB5E-4609-4A22-85BD-3651B3C4EFD9} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:320
    • C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
      C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1356
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Create /sc minute /mo 1 /tn "System" /tr C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
        3⤵
        • Creates scheduled task(s)
        PID:1768
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe
        3⤵
        • Blocklisted process makes network request
        PID:1764
    • C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
      C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:992
      • C:\Windows\SysWOW64\schtasks.exe
        schtasks /Create /sc minute /mo 1 /tn "System" /tr C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe
        3⤵
        • Creates scheduled task(s)
        PID:1476
      • C:\Windows\SysWOW64\rundll32.exe
        rundll32.exe
        3⤵
        • Blocklisted process makes network request
        PID:1192

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe

    Filesize

    3.4MB

    MD5

    0349e342af5e3cf743ce2175323ac62b

    SHA1

    e211bcd37e233a07324419ca908f23c0cbfe658f

    SHA256

    a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4

    SHA512

    1b4c84c96fc2391916715ebdaf4634b0c1b123e075f5ade99ccf903406e48605c6b5a4d29c7cc15585866604ae1d97af6813a25155be1ccb95e69bb8c2967374

  • C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe

    Filesize

    3.4MB

    MD5

    0349e342af5e3cf743ce2175323ac62b

    SHA1

    e211bcd37e233a07324419ca908f23c0cbfe658f

    SHA256

    a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4

    SHA512

    1b4c84c96fc2391916715ebdaf4634b0c1b123e075f5ade99ccf903406e48605c6b5a4d29c7cc15585866604ae1d97af6813a25155be1ccb95e69bb8c2967374

  • C:\Users\Admin\AppData\Local\Temp\WUDFHost32.exe

    Filesize

    3.4MB

    MD5

    0349e342af5e3cf743ce2175323ac62b

    SHA1

    e211bcd37e233a07324419ca908f23c0cbfe658f

    SHA256

    a28bd9e9f52e49517ca692f5e24733a15c0832fb823d767e699f0656bbd7f3f4

    SHA512

    1b4c84c96fc2391916715ebdaf4634b0c1b123e075f5ade99ccf903406e48605c6b5a4d29c7cc15585866604ae1d97af6813a25155be1ccb95e69bb8c2967374

  • memory/940-55-0x0000000000000000-mapping.dmp

  • memory/992-65-0x0000000000000000-mapping.dmp

  • memory/1192-69-0x0000000000EA178C-mapping.dmp

  • memory/1356-59-0x0000000000000000-mapping.dmp

  • memory/1476-68-0x0000000000000000-mapping.dmp

  • memory/1696-54-0x00000000766D1000-0x00000000766D3000-memory.dmp

    Filesize

    8KB

  • memory/1764-63-0x0000000000EA178C-mapping.dmp

  • memory/1768-62-0x0000000000000000-mapping.dmp

  • memory/1992-56-0x0000000000EA178C-mapping.dmp