Analysis
-
max time kernel
136s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 00:14
Static task
static1
Behavioral task
behavioral1
Sample
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe
Resource
win10v2004-20220812-en
General
-
Target
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe
-
Size
72KB
-
MD5
f09a3a45ff1326844ed5337a996eb26f
-
SHA1
2fbc9de4c8202a05e9e68329b965c84c0a5bc109
-
SHA256
05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
-
SHA512
51fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
SSDEEP
1536:nrFchFX18y5i+QRJl70G5svwPCkq383Inh:JycVyvwqkq383Y
Malware Config
Signatures
-
Executes dropped EXE 4 IoCs
pid Process 3468 rundll32.exe 4580 svchost.exe 3064 rundll32.exe 4964 svchost.exe -
Adds Run key to start application 2 TTPs 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Client Server Runtime Process = "C:\\Windows\\system32\\csrss.exe" 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Host-process Windows (Rundll32.exe) = "C:\\Users\\Admin\\AppData\\Roaming\\rundll32.exe" 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Service Host Process for Windows = "C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe" 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\csrss.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File opened for modification C:\Windows\SysWOW64\csrss.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File opened for modification C:\Windows\SysWOW64\rundll32.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File created C:\Windows\SysWOW64\rundll32.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File opened for modification C:\Windows\SysWOW64\svchost.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe File created C:\Windows\SysWOW64\svchost.exe 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe -
Suspicious use of SetThreadContext 3 IoCs
description pid Process procid_target PID 4216 set thread context of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 3468 set thread context of 3064 3468 rundll32.exe 83 PID 4580 set thread context of 4964 4580 svchost.exe 84 -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
pid Process 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 3468 rundll32.exe 4580 svchost.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 4216 wrote to memory of 2268 4216 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 80 PID 2268 wrote to memory of 3468 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 81 PID 2268 wrote to memory of 3468 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 81 PID 2268 wrote to memory of 3468 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 81 PID 2268 wrote to memory of 4580 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 82 PID 2268 wrote to memory of 4580 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 82 PID 2268 wrote to memory of 4580 2268 05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe 82 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 3468 wrote to memory of 3064 3468 rundll32.exe 83 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84 PID 4580 wrote to memory of 4964 4580 svchost.exe 84
Processes
-
C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4216 -
C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"C:\Users\Admin\AppData\Local\Temp\05ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066.exe"2⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Users\Admin\AppData\Roaming\rundll32.exe"C:\Users\Admin\AppData\Roaming\rundll32.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3468 -
C:\Users\Admin\AppData\Roaming\rundll32.exe"C:\Users\Admin\AppData\Roaming\rundll32.exe"4⤵
- Executes dropped EXE
PID:3064
-
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4580 -
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"4⤵
- Executes dropped EXE
PID:4964
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484
-
Filesize
72KB
MD5f09a3a45ff1326844ed5337a996eb26f
SHA12fbc9de4c8202a05e9e68329b965c84c0a5bc109
SHA25605ec94247e6388c0d9fc2d29632a058c5b5627eaa32c724c80bf8cf2a967b066
SHA51251fdbae8982ebfdc6a097d017d8320c140b4be959a90751b880dff831af80ff8ec44b950da555d9829fdf034bbe710a699c9c193e82e1be99e7c9f388940a484