Analysis

  • max time kernel
    150s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-12-2022 10:05

General

  • Target

    765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe

  • Size

    96KB

  • MD5

    6b77fb4dbc2d50b5e6e1713799e5b7cc

  • SHA1

    bbc2e9d9c5f6087d0aa8db4c68cfc436ece24ccd

  • SHA256

    765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db

  • SHA512

    fd2bb027691ca5e16c3b323644aa8524bc274c5580a3c9cac52ff8cc9d11eee818cacec8429dc6919ae1d2007131fc5a689f1d24c0e11a1b358a0d9cdeca7fda

  • SSDEEP

    1536:q8kcu4l7dSZ9T+2mxPAsL/JbuOLZ64ZCPBKbnziw1dVOcwCCQc+VDM+QJtOw/:wcj7k/y2mxB9uMzZCPBK1Dw9Raw/

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Program crash 2 IoCs
  • Suspicious use of WriteProcessMemory 13 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
    "C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:2476
    • C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
      C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
      2⤵
      • Adds Run key to start application
      • Suspicious use of WriteProcessMemory
      PID:1244
      • C:\Users\Admin\AppData\Roaming\taskhost.exe
        C:\Users\Admin\AppData\Roaming\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:4496
        • C:\Users\Admin\AppData\Roaming\taskhost.exe
          C:\Users\Admin\AppData\Roaming\taskhost.exe
          4⤵
          • Executes dropped EXE
          PID:1808
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 296
          4⤵
          • Program crash
          PID:4824
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 296
      2⤵
      • Program crash
      PID:4808
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2476 -ip 2476
    1⤵
      PID:1648
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4496 -ip 4496
      1⤵
        PID:4832

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\taskhost.exe

        Filesize

        96KB

        MD5

        3e8783189fae0711ed8cdf8ac87c0770

        SHA1

        9a63d3775dbd267e39c00a549e9cb3ffea3b087b

        SHA256

        3cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e

        SHA512

        07fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608

      • C:\Users\Admin\AppData\Roaming\taskhost.exe

        Filesize

        96KB

        MD5

        3e8783189fae0711ed8cdf8ac87c0770

        SHA1

        9a63d3775dbd267e39c00a549e9cb3ffea3b087b

        SHA256

        3cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e

        SHA512

        07fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608

      • C:\Users\Admin\AppData\Roaming\taskhost.exe

        Filesize

        96KB

        MD5

        3e8783189fae0711ed8cdf8ac87c0770

        SHA1

        9a63d3775dbd267e39c00a549e9cb3ffea3b087b

        SHA256

        3cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e

        SHA512

        07fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608

      • memory/1244-135-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1244-134-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1244-133-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1244-144-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1808-142-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1808-143-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB

      • memory/1808-145-0x0000000000400000-0x000000000042A000-memory.dmp

        Filesize

        168KB