Analysis
-
max time kernel
204s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
29-11-2022 05:48
Static task
static1
Behavioral task
behavioral1
Sample
8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe
Resource
win10v2004-20221111-en
General
-
Target
8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe
-
Size
118KB
-
MD5
0ab6af1c4960a34a7ad3b6ed6025461e
-
SHA1
820f382b05b44a86cbf2ac762dc48db0cdc6d6ce
-
SHA256
8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb
-
SHA512
ef7ddedbb65df37b81bb96eb5bbbb8a567656895e9307f05be7f0b569044edefff887b3db05f8fa1fff5427868878c49018bd96843996f23c7ac964b5fb397d6
-
SSDEEP
3072:CLWTEiR+gctabvQuKbtG3ftk3j30lQqAB1kO0exnr:CLWiYTQPG3VQya6O0
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 524 x9el0.exe 1020 x9el0.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\5k4ffdabvh = "C:\\Users\\Admin\\AppData\\Roaming\\x9el0.exe" 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4000 set thread context of 364 4000 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 82 PID 524 set thread context of 1020 524 x9el0.exe 86 -
Program crash 2 IoCs
pid pid_target Process procid_target 1836 4000 WerFault.exe 81 396 524 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4000 wrote to memory of 364 4000 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 82 PID 4000 wrote to memory of 364 4000 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 82 PID 4000 wrote to memory of 364 4000 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 82 PID 4000 wrote to memory of 364 4000 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 82 PID 4000 wrote to memory of 364 4000 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 82 PID 364 wrote to memory of 524 364 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 85 PID 364 wrote to memory of 524 364 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 85 PID 364 wrote to memory of 524 364 8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe 85 PID 524 wrote to memory of 1020 524 x9el0.exe 86 PID 524 wrote to memory of 1020 524 x9el0.exe 86 PID 524 wrote to memory of 1020 524 x9el0.exe 86 PID 524 wrote to memory of 1020 524 x9el0.exe 86 PID 524 wrote to memory of 1020 524 x9el0.exe 86
Processes
-
C:\Users\Admin\AppData\Local\Temp\8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe"C:\Users\Admin\AppData\Local\Temp\8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4000 -
C:\Users\Admin\AppData\Local\Temp\8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exeC:\Users\Admin\AppData\Local\Temp\8b621edfc6fa3695a3b60ec40bb9a2c2da6de7568cd5f63b22d7007d06ebbffb.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:364 -
C:\Users\Admin\AppData\Roaming\x9el0.exeC:\Users\Admin\AppData\Roaming\x9el0.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:524 -
C:\Users\Admin\AppData\Roaming\x9el0.exeC:\Users\Admin\AppData\Roaming\x9el0.exe4⤵
- Executes dropped EXE
PID:1020
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 524 -s 2924⤵
- Program crash
PID:396
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4000 -s 2922⤵
- Program crash
PID:1836
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 452 -p 4000 -ip 40001⤵PID:4092
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 432 -p 524 -ip 5241⤵PID:216
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD50cbc977492f5d4dd12eed31f05dfc925
SHA1cc3bf8a45f091d8eb0461e78a834623962fd7811
SHA256522f580985e2c59ec20027086345a9eda2b0ade71600fabe8643dea888d7bb7b
SHA512d2ac645babd72bdf097bc472286412e0e97a442486fe81ccf2162c4defd0840c327e6ee7192c7fdb6a63c2e2b7f3038f399d2f581a42e506d3e00545596f25f2
-
Filesize
118KB
MD50cbc977492f5d4dd12eed31f05dfc925
SHA1cc3bf8a45f091d8eb0461e78a834623962fd7811
SHA256522f580985e2c59ec20027086345a9eda2b0ade71600fabe8643dea888d7bb7b
SHA512d2ac645babd72bdf097bc472286412e0e97a442486fe81ccf2162c4defd0840c327e6ee7192c7fdb6a63c2e2b7f3038f399d2f581a42e506d3e00545596f25f2
-
Filesize
118KB
MD50cbc977492f5d4dd12eed31f05dfc925
SHA1cc3bf8a45f091d8eb0461e78a834623962fd7811
SHA256522f580985e2c59ec20027086345a9eda2b0ade71600fabe8643dea888d7bb7b
SHA512d2ac645babd72bdf097bc472286412e0e97a442486fe81ccf2162c4defd0840c327e6ee7192c7fdb6a63c2e2b7f3038f399d2f581a42e506d3e00545596f25f2