Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
Resource
win10v2004-20221111-en
General
-
Target
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe
-
Size
166KB
-
MD5
1225cf024f08fdf7741a0f8f9aa4e017
-
SHA1
18058c507f8b6a4574405b054b8e8f7b19052d7d
-
SHA256
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
-
SHA512
4f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
SSDEEP
3072:+/LXSE0vf7vHDBDRMxquipkcC3uewF2qH1NcZm7fJOWRwao9OgXcp:8ODRM8uqC35wFx/cZkhOIbOPu
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
svchost.exesvchost.exepid process 4088 svchost.exe 2072 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\mslivemsn = "C:\\Users\\Admin\\Librarys\\wgesdwx\\svchost.exe" c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exesvchost.exedescription pid process target process PID 668 wrote to memory of 4088 668 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe svchost.exe PID 668 wrote to memory of 4088 668 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe svchost.exe PID 668 wrote to memory of 4088 668 c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe svchost.exe PID 4088 wrote to memory of 2072 4088 svchost.exe svchost.exe PID 4088 wrote to memory of 2072 4088 svchost.exe svchost.exe PID 4088 wrote to memory of 2072 4088 svchost.exe svchost.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"1⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Users\Admin\Librarys\wgesdwx\svchost.exeC:\Users\Admin\Librarys\wgesdwx\svchost.exe "C:\Users\Admin\AppData\Local\Temp\c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:4088 -
C:\Users\Admin\Librarys\wgesdwx\svchost.exeC:\Users\Admin\Librarys\wgesdwx\svchost.exe --kk3⤵
- Executes dropped EXE
PID:2072
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4
-
Filesize
166KB
MD51225cf024f08fdf7741a0f8f9aa4e017
SHA118058c507f8b6a4574405b054b8e8f7b19052d7d
SHA256c1a4652dab20886ee5b938184653a0b2d1b95616557353cace78d415553c89bc
SHA5124f76c84e1906eee5993c09d4d748c6faa9ddaeff3b4c097e8b10c20395d9ee1a7a10126a7968d37a64d28589f19df671057e3cf384cd66972e298717f4caa8c4