Analysis
-
max time kernel
190s -
max time network
194s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
03/12/2022, 20:44
Static task
static1
Behavioral task
behavioral1
Sample
4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe
Resource
win10v2004-20220812-en
General
-
Target
4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe
-
Size
118KB
-
MD5
070f83f3f9d1cdaf8356548086632100
-
SHA1
00796b6237fbab6ceee4105b36ac934a348d9704
-
SHA256
4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1
-
SHA512
f914ad79879f4ee27f96a564c22ff82bf8509cc320928c21bd99caafb74464b4d1c4873a6abfff801062d3499922cc7caf568b6753f823ed5d649330855a5b34
-
SSDEEP
1536:+/qLmQlTyRHUpoKFoix5sRRxMA06Z9l4kQLYgvGFba4W+WzM954U/0p/xwb:Jmw6Upf5sRrMA0C9lgtvGFFWQTq/x
Malware Config
Signatures
-
Drops file in Drivers directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\drivers\svchast.exe 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe File created C:\Windows\SysWOW64\drivers\svchast.exe 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe -
Executes dropped EXE 1 IoCs
pid Process 4840 svchast.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 4840 svchast.exe 4840 svchast.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 4892 wrote to memory of 4840 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 79 PID 4892 wrote to memory of 4840 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 79 PID 4892 wrote to memory of 4840 4892 4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe 79
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe"C:\Users\Admin\AppData\Local\Temp\4f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1.exe"1⤵
- Drops file in Drivers directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4892 -
C:\Windows\SysWOW64\drivers\svchast.exeC:\Windows\system32\drivers\svchast.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:4840
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD5070f83f3f9d1cdaf8356548086632100
SHA100796b6237fbab6ceee4105b36ac934a348d9704
SHA2564f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1
SHA512f914ad79879f4ee27f96a564c22ff82bf8509cc320928c21bd99caafb74464b4d1c4873a6abfff801062d3499922cc7caf568b6753f823ed5d649330855a5b34
-
Filesize
118KB
MD5070f83f3f9d1cdaf8356548086632100
SHA100796b6237fbab6ceee4105b36ac934a348d9704
SHA2564f567434b2dad00f534ad3b5d5e1a5f7990e6407ae0229e50f5df09ec3877bc1
SHA512f914ad79879f4ee27f96a564c22ff82bf8509cc320928c21bd99caafb74464b4d1c4873a6abfff801062d3499922cc7caf568b6753f823ed5d649330855a5b34