Analysis
-
max time kernel
187s -
max time network
219s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 06:28
Static task
static1
Behavioral task
behavioral1
Sample
18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe
Resource
win10v2004-20220812-en
General
-
Target
18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe
-
Size
360KB
-
MD5
1a6a48789f351461e05a0ca047049490
-
SHA1
2ce8a5d5ee4a2dfcb0008915a6dde76e8f86a147
-
SHA256
18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d
-
SHA512
2af1148b7b7aca71a53c693a38db63d4513c3d6844eff2d0fb59102a0e93228c59dd8af8fef283506a18ab45b27ef424efc1751d67890b819a4b102c95e70a99
-
SSDEEP
6144:N9fryZqCvQVx6msZDy/dVSp24rzGgEE+bVRjYGfGSAr+59YQOQWI:NJryZdv66mIDy/d46gEEoTjYGfGSdTpd
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4868 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1696 set thread context of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 -
Program crash 2 IoCs
pid pid_target Process procid_target 1620 1696 WerFault.exe 77 4336 1696 WerFault.exe 77 -
Modifies registry class 18 IoCs
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\DefaultIcon 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\print\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18E681~1.EXE /p \"%1\"" 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\printto 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.s\ShellNew\NullFile 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\open 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\print\command 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\print 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.s 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\DefaultIcon\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18E681~1.EXE,0" 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\open\command 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\open\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18E681~1.EXE \"%1\"" 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\printto\command\ = "C:\\Users\\Admin\\AppData\\Local\\Temp\\18E681~1.EXE /pt \"%1\" \"%2\" \"%3\" \"%4\"" 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\.s\ = "S9.Document" 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\ = "S9 Document" 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\S9.Document\shell\printto\command 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe Key created \REGISTRY\MACHINE\SOFTWARE\Classes\.s\ShellNew 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe -
Runs net.exe
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe -
Suspicious use of WriteProcessMemory 17 IoCs
description pid Process procid_target PID 1696 wrote to memory of 3500 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 79 PID 1696 wrote to memory of 3500 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 79 PID 1696 wrote to memory of 3500 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 79 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 1696 wrote to memory of 4868 1696 18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe 80 PID 3500 wrote to memory of 4844 3500 cmd.exe 83 PID 3500 wrote to memory of 4844 3500 cmd.exe 83 PID 3500 wrote to memory of 4844 3500 cmd.exe 83 PID 4844 wrote to memory of 4084 4844 net.exe 85 PID 4844 wrote to memory of 4084 4844 net.exe 85 PID 4844 wrote to memory of 4084 4844 net.exe 85
Processes
-
C:\Users\Admin\AppData\Local\Temp\18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe"C:\Users\Admin\AppData\Local\Temp\18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe"1⤵
- Suspicious use of SetThreadContext
- Modifies registry class
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1696 -
C:\Windows\SysWOW64\cmd.exe/c net stop MpsSvc2⤵
- Suspicious use of WriteProcessMemory
PID:3500 -
C:\Windows\SysWOW64\net.exenet stop MpsSvc3⤵
- Suspicious use of WriteProcessMemory
PID:4844 -
C:\Windows\SysWOW64\net1.exeC:\Windows\system32\net1 stop MpsSvc4⤵PID:4084
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exeC:\Users\Admin\AppData\Local\Temp\18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe2⤵
- Executes dropped EXE
PID:4868
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 2602⤵
- Program crash
PID:1620
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 2602⤵
- Program crash
PID:4336
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 1696 -ip 16961⤵PID:4856
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 528 -p 1696 -ip 16961⤵PID:2464
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\18e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d.exe
Filesize360KB
MD51a6a48789f351461e05a0ca047049490
SHA12ce8a5d5ee4a2dfcb0008915a6dde76e8f86a147
SHA25618e681b5faa44d56f54a0265f4ae544045c6cd0d54fd80dc02deb6818b48769d
SHA5122af1148b7b7aca71a53c693a38db63d4513c3d6844eff2d0fb59102a0e93228c59dd8af8fef283506a18ab45b27ef424efc1751d67890b819a4b102c95e70a99