Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
23-11-2022 14:47
Static task
static1
Behavioral task
behavioral1
Sample
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe
Resource
win10v2004-20220901-en
General
-
Target
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe
-
Size
377KB
-
MD5
97de3e390b56a250cd6edc7ad6801a68
-
SHA1
3cef223df5d5d1059002ed26eee14b7852a39be6
-
SHA256
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41
-
SHA512
f45e0b7665b184c0b8a3a9a7b518bfc4129ba8a28619857462d53141c6eebb73faaae86f64d28fe5e2af25ef3ea7b7e33e2ffd1b4c835f62fce0e8da1cf44733
-
SSDEEP
6144:maK7YuRhCWXuFAjPv5Ab2IpFyEiul8vWjllQV5q031poyk9GNqcq:maKd0WKKvhICEidvalneo9Qq
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
pedeut.exepid process 1452 pedeut.exe -
Deletes itself 1 IoCs
Processes:
cmd.exepid process 272 cmd.exe -
Loads dropped DLL 1 IoCs
Processes:
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exepid process 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
pedeut.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run pedeut.exe Set value (str) \REGISTRY\USER\S-1-5-21-999675638-2867687379-27515722-1000\Software\Microsoft\Windows\CurrentVersion\Run\Pedeut = "C:\\Users\\Admin\\AppData\\Roaming\\Bauht\\pedeut.exe" pedeut.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exedescription pid process target process PID 1872 set thread context of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe -
Suspicious behavior: EnumeratesProcesses 26 IoCs
Processes:
pedeut.exepid process 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe 1452 pedeut.exe -
Suspicious use of WriteProcessMemory 33 IoCs
Processes:
21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exepedeut.exedescription pid process target process PID 1872 wrote to memory of 1452 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe pedeut.exe PID 1872 wrote to memory of 1452 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe pedeut.exe PID 1872 wrote to memory of 1452 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe pedeut.exe PID 1872 wrote to memory of 1452 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe pedeut.exe PID 1452 wrote to memory of 1252 1452 pedeut.exe taskhost.exe PID 1452 wrote to memory of 1252 1452 pedeut.exe taskhost.exe PID 1452 wrote to memory of 1252 1452 pedeut.exe taskhost.exe PID 1452 wrote to memory of 1252 1452 pedeut.exe taskhost.exe PID 1452 wrote to memory of 1252 1452 pedeut.exe taskhost.exe PID 1452 wrote to memory of 1344 1452 pedeut.exe Dwm.exe PID 1452 wrote to memory of 1344 1452 pedeut.exe Dwm.exe PID 1452 wrote to memory of 1344 1452 pedeut.exe Dwm.exe PID 1452 wrote to memory of 1344 1452 pedeut.exe Dwm.exe PID 1452 wrote to memory of 1344 1452 pedeut.exe Dwm.exe PID 1452 wrote to memory of 1408 1452 pedeut.exe Explorer.EXE PID 1452 wrote to memory of 1408 1452 pedeut.exe Explorer.EXE PID 1452 wrote to memory of 1408 1452 pedeut.exe Explorer.EXE PID 1452 wrote to memory of 1408 1452 pedeut.exe Explorer.EXE PID 1452 wrote to memory of 1408 1452 pedeut.exe Explorer.EXE PID 1452 wrote to memory of 1872 1452 pedeut.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 1452 wrote to memory of 1872 1452 pedeut.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 1452 wrote to memory of 1872 1452 pedeut.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 1452 wrote to memory of 1872 1452 pedeut.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 1452 wrote to memory of 1872 1452 pedeut.exe 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe PID 1872 wrote to memory of 272 1872 21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe cmd.exe
Processes
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"1⤵PID:1344
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe"C:\Users\Admin\AppData\Local\Temp\21c052e0dc12e9e5e47b2b30077658a5188f86f0c30d15cd9a405a33228e7e41.exe"2⤵
- Loads dropped DLL
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Roaming\Bauht\pedeut.exe"C:\Users\Admin\AppData\Roaming\Bauht\pedeut.exe"3⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1452 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\BBB1C00.bat"3⤵
- Deletes itself
PID:272
-
C:\Windows\system32\taskhost.exe"taskhost.exe"1⤵PID:1252
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
303B
MD530f1066c06d266d2db3b45b7327388dd
SHA1d22bdc630440775f18616e833ea94858e887150d
SHA2565065a46315b1abac8da427ff75b5f67b17c8121e0f22c206c3ba7343b2df12f8
SHA5125e9b884378463297786ed4436fdcd4157d1cf13a22daa0645649554fe21312cb0236b186087376d7c79e98456dddcae8a3049f373379acf91069ef34ea8bc3ff
-
Filesize
377KB
MD5763df5f9ea59f3e79495f3d5fb0bd7bd
SHA1eed621d9a33dd0eda4b328b591d0858b89fc0e13
SHA256c6a35dfc48c422d4f2b7f5096219754b52d8b4764269e740da8604e8c05fe0b5
SHA5120fa4c1084073499e4465059fb8308eec083318258c77cb2e88e49cea7a0aefe2592c9f31f34e6bde91771ee7ae24527931e2d0efc74ae80527d5423b12414673
-
Filesize
377KB
MD5763df5f9ea59f3e79495f3d5fb0bd7bd
SHA1eed621d9a33dd0eda4b328b591d0858b89fc0e13
SHA256c6a35dfc48c422d4f2b7f5096219754b52d8b4764269e740da8604e8c05fe0b5
SHA5120fa4c1084073499e4465059fb8308eec083318258c77cb2e88e49cea7a0aefe2592c9f31f34e6bde91771ee7ae24527931e2d0efc74ae80527d5423b12414673
-
Filesize
377KB
MD5763df5f9ea59f3e79495f3d5fb0bd7bd
SHA1eed621d9a33dd0eda4b328b591d0858b89fc0e13
SHA256c6a35dfc48c422d4f2b7f5096219754b52d8b4764269e740da8604e8c05fe0b5
SHA5120fa4c1084073499e4465059fb8308eec083318258c77cb2e88e49cea7a0aefe2592c9f31f34e6bde91771ee7ae24527931e2d0efc74ae80527d5423b12414673