Analysis
-
max time kernel
150s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01-12-2022 10:05
Static task
static1
Behavioral task
behavioral1
Sample
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
Resource
win10v2004-20220812-en
General
-
Target
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe
-
Size
96KB
-
MD5
6b77fb4dbc2d50b5e6e1713799e5b7cc
-
SHA1
bbc2e9d9c5f6087d0aa8db4c68cfc436ece24ccd
-
SHA256
765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db
-
SHA512
fd2bb027691ca5e16c3b323644aa8524bc274c5580a3c9cac52ff8cc9d11eee818cacec8429dc6919ae1d2007131fc5a689f1d24c0e11a1b358a0d9cdeca7fda
-
SSDEEP
1536:q8kcu4l7dSZ9T+2mxPAsL/JbuOLZ64ZCPBKbnziw1dVOcwCCQc+VDM+QJtOw/:wcj7k/y2mxB9uMzZCPBK1Dw9Raw/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4496 taskhost.exe 1808 taskhost.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe Key created \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2476 set thread context of 1244 2476 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 79 PID 4496 set thread context of 1808 4496 taskhost.exe 83 -
Program crash 2 IoCs
pid pid_target Process procid_target 4824 4496 WerFault.exe 82 4808 2476 WerFault.exe 78 -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2476 wrote to memory of 1244 2476 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 79 PID 2476 wrote to memory of 1244 2476 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 79 PID 2476 wrote to memory of 1244 2476 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 79 PID 2476 wrote to memory of 1244 2476 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 79 PID 2476 wrote to memory of 1244 2476 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 79 PID 1244 wrote to memory of 4496 1244 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 82 PID 1244 wrote to memory of 4496 1244 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 82 PID 1244 wrote to memory of 4496 1244 765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe 82 PID 4496 wrote to memory of 1808 4496 taskhost.exe 83 PID 4496 wrote to memory of 1808 4496 taskhost.exe 83 PID 4496 wrote to memory of 1808 4496 taskhost.exe 83 PID 4496 wrote to memory of 1808 4496 taskhost.exe 83 PID 4496 wrote to memory of 1808 4496 taskhost.exe 83
Processes
-
C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe"C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exeC:\Users\Admin\AppData\Local\Temp\765a795847dd1f71bb00fc1fbbfa42e3c0b55c1cce9a9a5776afb4b16b9096db.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1244 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4496 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
PID:1808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4496 -s 2964⤵
- Program crash
PID:4824
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 2962⤵
- Program crash
PID:4808
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 404 -p 2476 -ip 24761⤵PID:1648
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 456 -p 4496 -ip 44961⤵PID:4832
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608
-
Filesize
96KB
MD53e8783189fae0711ed8cdf8ac87c0770
SHA19a63d3775dbd267e39c00a549e9cb3ffea3b087b
SHA2563cece35ddac576a2f17693114503356c416b6f192738ddadf3a9445a538a698e
SHA51207fefe05695b27a8d545d8d23a18791e472895e994fafc04394eb840fca88586a2788cff59234c1f61ac8d6662ccd508886a51ac99e64655c588949dd4321608