Analysis
-
max time kernel
186s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 03:24
Static task
static1
Behavioral task
behavioral1
Sample
70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe
Resource
win10v2004-20221111-en
General
-
Target
70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe
-
Size
96KB
-
MD5
e5be71577d84bbffa67d2c3017afdf54
-
SHA1
9af1344ecb4c5f1d47804f229b5a06d32017361f
-
SHA256
70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381
-
SHA512
2597aeb09949afbc3e141df0dd751cc40a9d43159c9a5c734938be77b844fb984b8bfac04517c20dd817e7b47df09a9f61be8255082ef3fbb8a22dadcc764171
-
SSDEEP
1536:rY7PlAy7rMg9QletltwACUlC1YSZh70MKjHnKlH:r+NN7r5tjdG70MDH
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2224 taskhost.exe 316 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe Set value (str) \REGISTRY\USER\S-1-5-21-2386679933-1492765628-3466841596-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3292 set thread context of 4648 3292 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 82 PID 2224 set thread context of 316 2224 taskhost.exe 85 -
Program crash 2 IoCs
pid pid_target Process procid_target 1344 3292 WerFault.exe 81 2772 2224 WerFault.exe 84 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 3292 wrote to memory of 4648 3292 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 82 PID 3292 wrote to memory of 4648 3292 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 82 PID 3292 wrote to memory of 4648 3292 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 82 PID 3292 wrote to memory of 4648 3292 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 82 PID 3292 wrote to memory of 4648 3292 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 82 PID 4648 wrote to memory of 2224 4648 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 84 PID 4648 wrote to memory of 2224 4648 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 84 PID 4648 wrote to memory of 2224 4648 70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe 84 PID 2224 wrote to memory of 316 2224 taskhost.exe 85 PID 2224 wrote to memory of 316 2224 taskhost.exe 85 PID 2224 wrote to memory of 316 2224 taskhost.exe 85 PID 2224 wrote to memory of 316 2224 taskhost.exe 85 PID 2224 wrote to memory of 316 2224 taskhost.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe"C:\Users\Admin\AppData\Local\Temp\70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3292 -
C:\Users\Admin\AppData\Local\Temp\70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exeC:\Users\Admin\AppData\Local\Temp\70ef86554b0c0d5e033c90ffc7a9b9cc226a7b04cc48f592e9497c2e21ffd381.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:4648 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2224 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:316
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 2244⤵
- Program crash
PID:2772
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3292 -s 3042⤵
- Program crash
PID:1344
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 3292 -ip 32921⤵PID:2088
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2224 -ip 22241⤵PID:220
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5cf05028a1012b78b4eb99e6fa4470a14
SHA1bf18129e78fd49814e1f131d6b1a9e8789244fc0
SHA256faa38f7493a65bd8f926a1bc12051d116c943279c364c2d69399e3fe2bbba185
SHA512662e4fee6e59a97589b606de2583c780936905d75f8c17ff428325e33922a05baa0f11ef46d4d5084ca930552f23e7c8f00b10a9594f4d2ffe6a8e0b4254b829
-
Filesize
96KB
MD5cf05028a1012b78b4eb99e6fa4470a14
SHA1bf18129e78fd49814e1f131d6b1a9e8789244fc0
SHA256faa38f7493a65bd8f926a1bc12051d116c943279c364c2d69399e3fe2bbba185
SHA512662e4fee6e59a97589b606de2583c780936905d75f8c17ff428325e33922a05baa0f11ef46d4d5084ca930552f23e7c8f00b10a9594f4d2ffe6a8e0b4254b829
-
Filesize
96KB
MD5cf05028a1012b78b4eb99e6fa4470a14
SHA1bf18129e78fd49814e1f131d6b1a9e8789244fc0
SHA256faa38f7493a65bd8f926a1bc12051d116c943279c364c2d69399e3fe2bbba185
SHA512662e4fee6e59a97589b606de2583c780936905d75f8c17ff428325e33922a05baa0f11ef46d4d5084ca930552f23e7c8f00b10a9594f4d2ffe6a8e0b4254b829