Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 13:46
Static task
static1
Behavioral task
behavioral1
Sample
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe
Resource
win10v2004-20221111-en
General
-
Target
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe
-
Size
124KB
-
MD5
271a265825af40f9ccd5243a1e4fe275
-
SHA1
9394e716634dceeb654423cd95a9c9716725f0ac
-
SHA256
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5
-
SHA512
ac1997d299ef7b2c6720b824392239f57b9d6d744197deccdb850926d39460f4ff879a38a99b5a3496a26cf0fbdc8e901ba0ea81996a0b20685a115bd226de96
-
SSDEEP
3072:8cEE9t/0FZ3N68DfKrCAhh1m5fBC2dCiuN/:cFZ3N68DfUPt23G/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
taskhost.exetaskhost.exepid process 520 taskhost.exe 284 taskhost.exe -
Loads dropped DLL 2 IoCs
Processes:
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exepid process 1356 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 1356 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exetaskhost.exedescription pid process target process PID 1308 set thread context of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 520 set thread context of 284 520 taskhost.exe taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
Processes:
864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exetaskhost.exedescription pid process target process PID 1308 wrote to memory of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 1308 wrote to memory of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 1308 wrote to memory of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 1308 wrote to memory of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 1308 wrote to memory of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 1308 wrote to memory of 1356 1308 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe PID 1356 wrote to memory of 520 1356 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe taskhost.exe PID 1356 wrote to memory of 520 1356 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe taskhost.exe PID 1356 wrote to memory of 520 1356 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe taskhost.exe PID 1356 wrote to memory of 520 1356 864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe taskhost.exe PID 520 wrote to memory of 284 520 taskhost.exe taskhost.exe PID 520 wrote to memory of 284 520 taskhost.exe taskhost.exe PID 520 wrote to memory of 284 520 taskhost.exe taskhost.exe PID 520 wrote to memory of 284 520 taskhost.exe taskhost.exe PID 520 wrote to memory of 284 520 taskhost.exe taskhost.exe PID 520 wrote to memory of 284 520 taskhost.exe taskhost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe"C:\Users\Admin\AppData\Local\Temp\864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exeC:\Users\Admin\AppData\Local\Temp\864d8a6d5318eea7dc89ec864013fd33ee4d9f8d45f4bac2cade829362cc43e5.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:284
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
124KB
MD58150c2abc47144b9cd539a1121f3e18b
SHA1bc1a194a34d1fae7a496df95566d300d297936f5
SHA25670645c3816c086a4afcd535ace7f87795cd59ae4a4b7e7364afa47def3d26e43
SHA512a90a32c889236103315e2d8feb32e2d9f87f851107e0b715878e6b81cc42070061e1a12b9c17acfbd134c9485f414b9a47289061d69bd0197debc33710cbcd04
-
Filesize
124KB
MD58150c2abc47144b9cd539a1121f3e18b
SHA1bc1a194a34d1fae7a496df95566d300d297936f5
SHA25670645c3816c086a4afcd535ace7f87795cd59ae4a4b7e7364afa47def3d26e43
SHA512a90a32c889236103315e2d8feb32e2d9f87f851107e0b715878e6b81cc42070061e1a12b9c17acfbd134c9485f414b9a47289061d69bd0197debc33710cbcd04
-
Filesize
124KB
MD58150c2abc47144b9cd539a1121f3e18b
SHA1bc1a194a34d1fae7a496df95566d300d297936f5
SHA25670645c3816c086a4afcd535ace7f87795cd59ae4a4b7e7364afa47def3d26e43
SHA512a90a32c889236103315e2d8feb32e2d9f87f851107e0b715878e6b81cc42070061e1a12b9c17acfbd134c9485f414b9a47289061d69bd0197debc33710cbcd04
-
Filesize
124KB
MD58150c2abc47144b9cd539a1121f3e18b
SHA1bc1a194a34d1fae7a496df95566d300d297936f5
SHA25670645c3816c086a4afcd535ace7f87795cd59ae4a4b7e7364afa47def3d26e43
SHA512a90a32c889236103315e2d8feb32e2d9f87f851107e0b715878e6b81cc42070061e1a12b9c17acfbd134c9485f414b9a47289061d69bd0197debc33710cbcd04
-
Filesize
124KB
MD58150c2abc47144b9cd539a1121f3e18b
SHA1bc1a194a34d1fae7a496df95566d300d297936f5
SHA25670645c3816c086a4afcd535ace7f87795cd59ae4a4b7e7364afa47def3d26e43
SHA512a90a32c889236103315e2d8feb32e2d9f87f851107e0b715878e6b81cc42070061e1a12b9c17acfbd134c9485f414b9a47289061d69bd0197debc33710cbcd04