Analysis
-
max time kernel
190s -
max time network
206s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 00:39
Static task
static1
Behavioral task
behavioral1
Sample
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe
Resource
win10v2004-20221111-en
General
-
Target
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe
-
Size
127KB
-
MD5
9ad3d97eb3aab4ac69bb7a80582244d3
-
SHA1
0a90ec3bc6d3913968d169bbb62d8eda9192e715
-
SHA256
933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833
-
SHA512
3374229c810ac59ad2b7ba2fe5c04bf844fd9c063a91e952b056fbdf66e61ddfc597a311a03c29943a903305af35b64b97fccb1288e5c76b0b8514f53ad04e33
-
SSDEEP
1536:1bwfX/d/D6V5WpetAxplna5bdOALzQO/kzvE9l8f+iou2c7T7EPldgx:1bo/AWpetAxpVaBQOszvWQLr7TSkx
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4840 taskhost.exe 3396 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe Set value (str) \REGISTRY\USER\S-1-5-21-4246620582-653642754-1174164128-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3648 set thread context of 1844 3648 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 82 PID 4840 set thread context of 3396 4840 taskhost.exe 87 -
Program crash 2 IoCs
pid pid_target Process procid_target 5052 3648 WerFault.exe 81 3732 4840 WerFault.exe 85 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3648 wrote to memory of 1844 3648 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 82 PID 3648 wrote to memory of 1844 3648 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 82 PID 3648 wrote to memory of 1844 3648 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 82 PID 3648 wrote to memory of 1844 3648 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 82 PID 3648 wrote to memory of 1844 3648 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 82 PID 1844 wrote to memory of 4840 1844 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 85 PID 1844 wrote to memory of 4840 1844 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 85 PID 1844 wrote to memory of 4840 1844 933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe 85 PID 4840 wrote to memory of 3396 4840 taskhost.exe 87 PID 4840 wrote to memory of 3396 4840 taskhost.exe 87 PID 4840 wrote to memory of 3396 4840 taskhost.exe 87 PID 4840 wrote to memory of 3396 4840 taskhost.exe 87 PID 4840 wrote to memory of 3396 4840 taskhost.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe"C:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3648 -
C:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exeC:\Users\Admin\AppData\Local\Temp\933db0788026f212b2fcfec027024344cd8b843a00c6fdd834d5c31c1fcff833.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4840 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:3396
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4840 -s 2924⤵
- Program crash
PID:3732
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3648 -s 2922⤵
- Program crash
PID:5052
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 3648 -ip 36481⤵PID:4824
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 468 -p 4840 -ip 48401⤵PID:2316
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633
-
Filesize
127KB
MD52aaf72ea26dfcd1ca2095a6489ca27de
SHA1a473e8ab732f6076e5014ed988901447fd1d110a
SHA25696498c51beccd00b79b7dacc9c5bab1f1a4b3e17bc2b21d3bd613f162610b8c8
SHA512770fc39c53de001f2f9c565b4ac1481e0cc8f925772fd754cb78b4bb0f81cd382d6f2b319eda27dc1f54df7a704257ef06590d2b28055b0293e77ee763d4e633