Analysis
-
max time kernel
144s -
max time network
151s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
01-12-2022 10:06
Static task
static1
Behavioral task
behavioral1
Sample
c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe
Resource
win10v2004-20220812-en
General
-
Target
c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe
-
Size
96KB
-
MD5
8ad8feb6996642a751dc3979c1cc527f
-
SHA1
838adaf728ab925d46d31b47d40aa5ea7831f5f5
-
SHA256
c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947
-
SHA512
119a205ed97161b22384168ee157a3b6eb0385e589307ae3318a63b11123cda0b957ae3001ee8130eb02dc5a7dd37bc431dccc8ff1e3a637a17dbe212bbe3503
-
SSDEEP
1536:Y8fGHUrKRtrhcamH7XVkEmiSngrR92SjuJ7cPcj3CnisY3A2ro4dxti/:5GH2KRXc3blXmtnitjuJG6SisYQT4b4/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 936 taskhost.exe 568 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1504 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 1504 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe Key created \REGISTRY\USER\S-1-5-21-3385717845-2518323428-350143044-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1576 set thread context of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 936 set thread context of 568 936 taskhost.exe 30 -
description ioc Process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CABD2A79A1076A31F21D253635CB039D4329A5E8\Blob = 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 taskhost.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 taskhost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1576 wrote to memory of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 1576 wrote to memory of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 1576 wrote to memory of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 1576 wrote to memory of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 1576 wrote to memory of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 1576 wrote to memory of 1504 1576 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 28 PID 1504 wrote to memory of 936 1504 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 29 PID 1504 wrote to memory of 936 1504 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 29 PID 1504 wrote to memory of 936 1504 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 29 PID 1504 wrote to memory of 936 1504 c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe 29 PID 936 wrote to memory of 568 936 taskhost.exe 30 PID 936 wrote to memory of 568 936 taskhost.exe 30 PID 936 wrote to memory of 568 936 taskhost.exe 30 PID 936 wrote to memory of 568 936 taskhost.exe 30 PID 936 wrote to memory of 568 936 taskhost.exe 30 PID 936 wrote to memory of 568 936 taskhost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe"C:\Users\Admin\AppData\Local\Temp\c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exeC:\Users\Admin\AppData\Local\Temp\c6bb9e82971147e80f3ecae9e3ab1281a45e79b28a1bf6989856ca0b021f4947.exe2⤵
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:1504 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:936 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe4⤵
- Executes dropped EXE
- Modifies system certificate store
PID:568
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
96KB
MD5a0679e57f476530e46168c86cbb317bc
SHA1e199ecf323f31bf1c29afab060a64bdc275cdd25
SHA256fc5c9f3dd84458df4618824d49ccf0aa3ac0ca3d71b5a4ee23b3d6390c7a91ac
SHA512f0d541a8fcf86b6fb73f84c38dc695ac8571aee15891d608c3072ceb0f25f00550c857b627af24f58e8d7c628e4e6da8e72dfe4f29a16f074e519b7c2ca02d18
-
Filesize
96KB
MD5a0679e57f476530e46168c86cbb317bc
SHA1e199ecf323f31bf1c29afab060a64bdc275cdd25
SHA256fc5c9f3dd84458df4618824d49ccf0aa3ac0ca3d71b5a4ee23b3d6390c7a91ac
SHA512f0d541a8fcf86b6fb73f84c38dc695ac8571aee15891d608c3072ceb0f25f00550c857b627af24f58e8d7c628e4e6da8e72dfe4f29a16f074e519b7c2ca02d18
-
Filesize
96KB
MD5a0679e57f476530e46168c86cbb317bc
SHA1e199ecf323f31bf1c29afab060a64bdc275cdd25
SHA256fc5c9f3dd84458df4618824d49ccf0aa3ac0ca3d71b5a4ee23b3d6390c7a91ac
SHA512f0d541a8fcf86b6fb73f84c38dc695ac8571aee15891d608c3072ceb0f25f00550c857b627af24f58e8d7c628e4e6da8e72dfe4f29a16f074e519b7c2ca02d18
-
Filesize
96KB
MD5a0679e57f476530e46168c86cbb317bc
SHA1e199ecf323f31bf1c29afab060a64bdc275cdd25
SHA256fc5c9f3dd84458df4618824d49ccf0aa3ac0ca3d71b5a4ee23b3d6390c7a91ac
SHA512f0d541a8fcf86b6fb73f84c38dc695ac8571aee15891d608c3072ceb0f25f00550c857b627af24f58e8d7c628e4e6da8e72dfe4f29a16f074e519b7c2ca02d18
-
Filesize
96KB
MD5a0679e57f476530e46168c86cbb317bc
SHA1e199ecf323f31bf1c29afab060a64bdc275cdd25
SHA256fc5c9f3dd84458df4618824d49ccf0aa3ac0ca3d71b5a4ee23b3d6390c7a91ac
SHA512f0d541a8fcf86b6fb73f84c38dc695ac8571aee15891d608c3072ceb0f25f00550c857b627af24f58e8d7c628e4e6da8e72dfe4f29a16f074e519b7c2ca02d18