Analysis
-
max time kernel
150s -
max time network
173s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
01/12/2022, 00:39
Static task
static1
Behavioral task
behavioral1
Sample
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe
Resource
win10v2004-20221111-en
General
-
Target
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe
-
Size
127KB
-
MD5
9ad3d97eb3aab4ac69bb7a80582244d3
-
SHA1
0a90ec3bc6d3913968d169bbb62d8eda9192e715
-
SHA256
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833
-
SHA512
3374229c810ac59ad2b7ba2fe5c04bf844fd9c063a91e952b056fbdf66e61ddfc597a311a03c29943a903305af35b64b97fccb1288e5c76b0b8514f53ad04e33
-
SSDEEP
1536:1bwfX/d/D6V5WpetAxplna5bdOALzQO/kzvE9l8f+iou2c7T7EPldgx:1bo/AWpetAxpVaBQOszvWQLr7TSkx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1780 taskhost.exe 1184 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1908 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 1908 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe Set value (str) \REGISTRY\USER\S-1-5-21-2292972927-2705560509-2768824231-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 748 set thread context of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 1780 set thread context of 1184 1780 taskhost.exe 31 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 748 wrote to memory of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 748 wrote to memory of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 748 wrote to memory of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 748 wrote to memory of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 748 wrote to memory of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 748 wrote to memory of 1908 748 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 28 PID 1908 wrote to memory of 1780 1908 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 29 PID 1908 wrote to memory of 1780 1908 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 29 PID 1908 wrote to memory of 1780 1908 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 29 PID 1908 wrote to memory of 1780 1908 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 29 PID 1780 wrote to memory of 1184 1780 taskhost.exe 31 PID 1780 wrote to memory of 1184 1780 taskhost.exe 31 PID 1780 wrote to memory of 1184 1780 taskhost.exe 31 PID 1780 wrote to memory of 1184 1780 taskhost.exe 31 PID 1780 wrote to memory of 1184 1780 taskhost.exe 31 PID 1780 wrote to memory of 1184 1780 taskhost.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe"C:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:748 -
C:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exeC:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1780 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:1184
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633