Analysis

  • max time kernel
    183s
  • max time network
    212s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    01/12/2022, 10:04

General

  • Target

    baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe

  • Size

    96KB

  • MD5

    4be1ac9452947d3000daca209972d3cc

  • SHA1

    595d3d653581f70b02c9510d76d4b7a70df73e10

  • SHA256

    baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01

  • SHA512

    2b11d8a798e988aa910d25bbebf55f251f354e659d9a5f4d505dffd9e21f7582c7ca2163fb2971a056fa958a67dc6710382a986348161939cc3a11e37138e0f0

  • SSDEEP

    1536:S2dX/KGcry9vASJJ2DbxN4j+s+Ci5d5lIE1ppxRp9bDEvLlIAA31cviZi/:d/V2yVHsQjN+Ci9l5Zp5SIAA3LZi/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe
    "C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1212
    • C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe
      C:\Users\Admin\AppData\Local\Temp\baa38e1a42600a3e470b469c423740c383bc0f0cd35b5e794bd8bfec26105e01.exe
      2⤵
      • Loads dropped DLL
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1988
      • C:\Users\Admin\AppData\Roaming\taskhost.exe
        C:\Users\Admin\AppData\Roaming\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1512
        • C:\Users\Admin\AppData\Roaming\taskhost.exe
          C:\Users\Admin\AppData\Roaming\taskhost.exe
          4⤵
          • Executes dropped EXE
          • Modifies system certificate store
          PID:676

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\taskhost.exe

    Filesize

    96KB

    MD5

    413eb4df6fca058373d2e07edabb1ef2

    SHA1

    71d23bf40422d8b0815d87f4e5f99f47c3912334

    SHA256

    1f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a

    SHA512

    981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc

  • C:\Users\Admin\AppData\Roaming\taskhost.exe

    Filesize

    96KB

    MD5

    413eb4df6fca058373d2e07edabb1ef2

    SHA1

    71d23bf40422d8b0815d87f4e5f99f47c3912334

    SHA256

    1f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a

    SHA512

    981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc

  • C:\Users\Admin\AppData\Roaming\taskhost.exe

    Filesize

    96KB

    MD5

    413eb4df6fca058373d2e07edabb1ef2

    SHA1

    71d23bf40422d8b0815d87f4e5f99f47c3912334

    SHA256

    1f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a

    SHA512

    981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc

  • \Users\Admin\AppData\Roaming\taskhost.exe

    Filesize

    96KB

    MD5

    413eb4df6fca058373d2e07edabb1ef2

    SHA1

    71d23bf40422d8b0815d87f4e5f99f47c3912334

    SHA256

    1f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a

    SHA512

    981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc

  • \Users\Admin\AppData\Roaming\taskhost.exe

    Filesize

    96KB

    MD5

    413eb4df6fca058373d2e07edabb1ef2

    SHA1

    71d23bf40422d8b0815d87f4e5f99f47c3912334

    SHA256

    1f28e884b043bbb340954fdd59a8efcf8fc9494cade4f83144fe57e7ac0f142a

    SHA512

    981377df10be155d3da647be0b25c8d6188737b078780b3d2d1a76b75b356b6c4258fa5695aaf5064928ba19d78ee1cf1f7654aefa3cb2793c833661c0418ccc

  • memory/676-75-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/676-74-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/676-68-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1988-54-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1988-60-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1988-59-0x00000000767B1000-0x00000000767B3000-memory.dmp

    Filesize

    8KB

  • memory/1988-72-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB

  • memory/1988-56-0x0000000000400000-0x000000000042B000-memory.dmp

    Filesize

    172KB