Analysis
-
max time kernel
112s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
23-11-2022 15:55
Static task
static1
Behavioral task
behavioral1
Sample
7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe
Resource
win10v2004-20220901-en
General
-
Target
7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe
-
Size
140KB
-
MD5
53a68f0cf96c1d3b1974f90e29594021
-
SHA1
667bbd49c84c2ca1e2c410c233aa56cff832c5b7
-
SHA256
7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014
-
SHA512
5ab965aa4954cbedbf8f8c151fc6b58c5d20a983d3973f5620fe81c244dccbf6b1272949b17d37f36730c4633f6d397c43d08b1b885adc8384862ce00a9bdae1
-
SSDEEP
3072:UyH99g4byc6H5c6HcT66vlmm+kfueHd3ikeu6BzlJGXB/GWSa:UyH7xOc6H5c6HcT66vlmIJHd3TGBxJG5
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
svchost.exe7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exesvchost.exepid process 4560 svchost.exe 692 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe 3280 svchost.exe -
Drops file in Program Files directory 38 IoCs
Processes:
svchost.exedescription ioc process File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeClickToRun.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\notification_helper.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jcmd.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zFM.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\setup.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javac.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VSTO\10.0\VSTOInstaller.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javap.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javapackager.exe svchost.exe File opened for modification C:\Program Files\7-Zip\Uninstall.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\InspectorOfficeGadget.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\appletviewer.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jar.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java-rmi.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\appvcleaner.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\MavInject32.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\extcheck.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaw.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\java.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javafxpackager.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7z.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVShNotify.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\IntegratedOffice.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome_proxy.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javah.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\chrome_pwa_launcher.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\elevation_service.exe svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\89.0.4389.114\Installer\chrmstp.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\idlj.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jarsigner.exe svchost.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javaws.exe svchost.exe File opened for modification C:\Program Files\7-Zip\7zG.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\OfficeC2RClient.exe svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\OFFICE16\LICLUA.EXE svchost.exe File opened for modification C:\Program Files\Common Files\microsoft shared\Source Engine\OSE.EXE svchost.exe File opened for modification C:\Program Files\Google\Chrome\Application\chrome.exe svchost.exe -
Drops file in Windows directory 1 IoCs
Processes:
7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exedescription ioc process File created C:\Windows\svchost.exe 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 5092 692 WerFault.exe 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exesvchost.exedescription pid process target process PID 3116 wrote to memory of 4560 3116 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe svchost.exe PID 3116 wrote to memory of 4560 3116 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe svchost.exe PID 3116 wrote to memory of 4560 3116 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe svchost.exe PID 4560 wrote to memory of 692 4560 svchost.exe 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe PID 4560 wrote to memory of 692 4560 svchost.exe 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe PID 4560 wrote to memory of 692 4560 svchost.exe 7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe"C:\Users\Admin\AppData\Local\Temp\7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:3116 -
C:\Windows\svchost.exe"C:\Windows\svchost.exe" "C:\Users\Admin\AppData\Local\Temp\7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4560 -
C:\Users\Admin\AppData\Local\Temp\7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe"C:\Users\Admin\AppData\Local\Temp\7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe"3⤵
- Executes dropped EXE
PID:692 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 692 -s 4084⤵
- Program crash
PID:5092
-
C:\Windows\svchost.exeC:\Windows\svchost.exe1⤵
- Executes dropped EXE
- Drops file in Program Files directory
PID:3280
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 420 -p 692 -ip 6921⤵PID:5000
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\7cc0f5536c14d9ec159c3d6ffc411e5e29f6b9eb0c40b965e3b60dc4b792b014.exe
Filesize104KB
MD5116f0663be55aae3f5efb171e515098c
SHA13d6865e96cdb35802a807b3469e36a2335f7a85c
SHA2564850ea28b096857732d68bc98c12c9a778d8f7335d8fdb4101a8389f9a8a2ef7
SHA512c826d3faf957b16a71e88e7754dcf8fdb0abecaf2cd05a0661b6ddfded7801a16dc66d82c0c91531b5784bd260529f5807904b008bbdfb3809e805a13accd1ac
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b
-
Filesize
35KB
MD59e3c13b6556d5636b745d3e466d47467
SHA12ac1c19e268c49bc508f83fe3d20f495deb3e538
SHA25620af03add533a6870d524a7c4753b42bfceb56cddd46016c051e23581ba743f8
SHA5125a07ba8a7fcb15f64b129fada2621252b8bc37eb34d4f614c075c064f8ac0d367301eba0c32c5e28b8aa633f6ab604f0dfcc363b34734ce0207ef0d4e8817c4b