Analysis
-
max time kernel
357s -
max time network
415s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
27/11/2022, 01:21
Static task
static1
Behavioral task
behavioral1
Sample
888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe
Resource
win10v2004-20221111-en
General
-
Target
888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe
-
Size
200KB
-
MD5
e20610bcde8eb48e7e0c4a4201e58f6c
-
SHA1
7a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
-
SHA256
888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
-
SHA512
d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
SSDEEP
3072:a9ESBUeFwBYssMv83wTJsX2B0OiHpwUFQCSIiwAnJ5zDScPq3FBfn+wBz:CqYOvSw+XM2RKzIiwAnJhScg+C
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 4612 svchosts.exe 4168 svchosts.exe 2792 svchosts.exe 1832 svchosts.exe 4124 svchosts.exe 1696 svchosts.exe 5112 svchosts.exe 2808 svchosts.exe 1544 svchosts.exe -
Drops file in System32 directory 6 IoCs
description ioc Process File created C:\Windows\SysWOW64\svchosts.exe 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe File opened for modification C:\Windows\SysWOW64\svchosts.exe 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe File created C:\Windows\SysWOW64\svchosts.exe svchosts.exe -
Suspicious use of SetThreadContext 5 IoCs
description pid Process procid_target PID 4152 set thread context of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4612 set thread context of 4168 4612 svchosts.exe 85 PID 2792 set thread context of 1832 2792 svchosts.exe 87 PID 4124 set thread context of 1696 4124 svchosts.exe 90 PID 5112 set thread context of 2808 5112 svchosts.exe 92 -
Suspicious use of SetWindowsHookEx 16 IoCs
pid Process 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 668 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 668 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 4612 svchosts.exe 4168 svchosts.exe 4168 svchosts.exe 2792 svchosts.exe 1832 svchosts.exe 1832 svchosts.exe 4124 svchosts.exe 1696 svchosts.exe 1696 svchosts.exe 5112 svchosts.exe 2808 svchosts.exe 2808 svchosts.exe 1544 svchosts.exe -
Suspicious use of WriteProcessMemory 55 IoCs
description pid Process procid_target PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 4152 wrote to memory of 668 4152 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 81 PID 668 wrote to memory of 4612 668 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 84 PID 668 wrote to memory of 4612 668 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 84 PID 668 wrote to memory of 4612 668 888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe 84 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4612 wrote to memory of 4168 4612 svchosts.exe 85 PID 4168 wrote to memory of 2792 4168 svchosts.exe 86 PID 4168 wrote to memory of 2792 4168 svchosts.exe 86 PID 4168 wrote to memory of 2792 4168 svchosts.exe 86 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 2792 wrote to memory of 1832 2792 svchosts.exe 87 PID 1832 wrote to memory of 4124 1832 svchosts.exe 88 PID 1832 wrote to memory of 4124 1832 svchosts.exe 88 PID 1832 wrote to memory of 4124 1832 svchosts.exe 88 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 4124 wrote to memory of 1696 4124 svchosts.exe 90 PID 1696 wrote to memory of 5112 1696 svchosts.exe 91 PID 1696 wrote to memory of 5112 1696 svchosts.exe 91 PID 1696 wrote to memory of 5112 1696 svchosts.exe 91 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 5112 wrote to memory of 2808 5112 svchosts.exe 92 PID 2808 wrote to memory of 1544 2808 svchosts.exe 93 PID 2808 wrote to memory of 1544 2808 svchosts.exe 93 PID 2808 wrote to memory of 1544 2808 svchosts.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe"C:\Users\Admin\AppData\Local\Temp\888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Users\Admin\AppData\Local\Temp\888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exeC:\Users\Admin\AppData\Local\Temp\888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41.exe2⤵
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:668 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe4⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4168 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe5⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe6⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1832 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe7⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4124 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe8⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe9⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:5112 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\SysWOW64\svchosts.exe10⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Windows\SysWOW64\svchosts.exeC:\Windows\system32\svchosts.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe
-
Filesize
200KB
MD5e20610bcde8eb48e7e0c4a4201e58f6c
SHA17a231a9b22af985052d7e3ca6fb3a0d5a9fd225a
SHA256888d8ff21833e1896fb3573c836c101ed0a36b35ae99f09d386fa6d3ed94bb41
SHA512d6a95d0a945b8dcc407c86e6f2a531ffc83a5bd66f0f5b5dfe71eb7019c4f6c65b20b4e5498f6fe9466c14dbff9c06984e4a2358d7c7c33603b06ddf90813ebe