Analysis
-
max time kernel
316s -
max time network
364s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
28-11-2022 16:22
Static task
static1
Behavioral task
behavioral1
Sample
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe
Resource
win10v2004-20221111-en
General
-
Target
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe
-
Size
928KB
-
MD5
284b37c4771f4dcf91a37348014e04ff
-
SHA1
211e5aa4cc0451aa252660576fc5c6a1961667fd
-
SHA256
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913
-
SHA512
dddfd3b527d57ef5b2ac806ca7c083033d05b0df39b7b6513069c91eb43c8645ee2641e5203366a53de3abd7578f254d84ea2ebaebf33388d591d2db787fa568
-
SSDEEP
24576:+TSkT7/hjVX1uKLGLY27AX1Wh6qC/UxPpXWhi:Evl3LG0h1KZkwPhW
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
oiesczh.exeoiesczh.exepid process 1028 oiesczh.exe 4392 oiesczh.exe -
Drops file in System32 directory 1 IoCs
Processes:
oiesczh.exedescription ioc process File created C:\Windows\SysWOW64\config\systemprofile\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\oiesczh.exe.log oiesczh.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exeoiesczh.exedescription pid process target process PID 3700 set thread context of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 1028 set thread context of 4392 1028 oiesczh.exe oiesczh.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exepid process 4208 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 4208 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe -
Suspicious use of WriteProcessMemory 12 IoCs
Processes:
749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exeoiesczh.exedescription pid process target process PID 3700 wrote to memory of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 3700 wrote to memory of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 3700 wrote to memory of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 3700 wrote to memory of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 3700 wrote to memory of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 3700 wrote to memory of 4208 3700 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe 749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe PID 1028 wrote to memory of 4392 1028 oiesczh.exe oiesczh.exe PID 1028 wrote to memory of 4392 1028 oiesczh.exe oiesczh.exe PID 1028 wrote to memory of 4392 1028 oiesczh.exe oiesczh.exe PID 1028 wrote to memory of 4392 1028 oiesczh.exe oiesczh.exe PID 1028 wrote to memory of 4392 1028 oiesczh.exe oiesczh.exe PID 1028 wrote to memory of 4392 1028 oiesczh.exe oiesczh.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe"C:\Users\Admin\AppData\Local\Temp\749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe"C:\Users\Admin\AppData\Local\Temp\749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Users\Admin\AppData\Local\Temp\oiesczh.exeC:\Users\Admin\AppData\Local\Temp\oiesczh.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\oiesczh.exe"C:\Users\Admin\AppData\Local\Temp\oiesczh.exe"2⤵
- Executes dropped EXE
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\oiesczh.exeFilesize
928KB
MD5284b37c4771f4dcf91a37348014e04ff
SHA1211e5aa4cc0451aa252660576fc5c6a1961667fd
SHA256749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913
SHA512dddfd3b527d57ef5b2ac806ca7c083033d05b0df39b7b6513069c91eb43c8645ee2641e5203366a53de3abd7578f254d84ea2ebaebf33388d591d2db787fa568
-
C:\Users\Admin\AppData\Local\Temp\oiesczh.exeFilesize
928KB
MD5284b37c4771f4dcf91a37348014e04ff
SHA1211e5aa4cc0451aa252660576fc5c6a1961667fd
SHA256749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913
SHA512dddfd3b527d57ef5b2ac806ca7c083033d05b0df39b7b6513069c91eb43c8645ee2641e5203366a53de3abd7578f254d84ea2ebaebf33388d591d2db787fa568
-
C:\Users\Admin\AppData\Local\Temp\oiesczh.exeFilesize
928KB
MD5284b37c4771f4dcf91a37348014e04ff
SHA1211e5aa4cc0451aa252660576fc5c6a1961667fd
SHA256749b990f8fe76d019574a8084e4bc6dccaef3c4370f14d1ff3097d82b6176913
SHA512dddfd3b527d57ef5b2ac806ca7c083033d05b0df39b7b6513069c91eb43c8645ee2641e5203366a53de3abd7578f254d84ea2ebaebf33388d591d2db787fa568
-
memory/1028-152-0x00000000746B0000-0x0000000074C61000-memory.dmpFilesize
5.7MB
-
memory/1028-144-0x00000000746B0000-0x0000000074C61000-memory.dmpFilesize
5.7MB
-
memory/1028-143-0x00000000746B0000-0x0000000074C61000-memory.dmpFilesize
5.7MB
-
memory/3700-132-0x0000000075230000-0x00000000757E1000-memory.dmpFilesize
5.7MB
-
memory/3700-139-0x0000000075230000-0x00000000757E1000-memory.dmpFilesize
5.7MB
-
memory/4208-137-0x0000000000400000-0x00000000004A5000-memory.dmpFilesize
660KB
-
memory/4208-140-0x0000000000FB0000-0x00000000011FB000-memory.dmpFilesize
2.3MB
-
memory/4208-138-0x0000000000D90000-0x0000000000FAA000-memory.dmpFilesize
2.1MB
-
memory/4208-134-0x0000000000400000-0x00000000004A5000-memory.dmpFilesize
660KB
-
memory/4208-133-0x0000000000000000-mapping.dmp
-
memory/4392-145-0x0000000000000000-mapping.dmp