Analysis

  • max time kernel
    182s
  • max time network
    227s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    05/12/2022, 13:09

General

  • Target

    853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe

  • Size

    119KB

  • MD5

    2113792abb4900e63bd206558ec0fec0

  • SHA1

    ef3d0401be4048661889b1ef92e57fec1541dec7

  • SHA256

    853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946

  • SHA512

    b03a0b8ac5c8e57a8beb41ce4b45257e65c918c2021d17aba48ac089bd40cedf3b382487ba84e67334a28c824406d08f20fc4df5d9c3f1c46041e6058f807908

  • SSDEEP

    1536:/xpaqPur9ZAPYXQL5rJEznVo4aWdyYTqbmBupoexeQFQB0s31ZWfJeCNLWNSJw3b:6XXQL5rin2EyuE9ouerB0wWJgvUmL1

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe
    "C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1828
    • C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe
      C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1360
      • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:624
        • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
          C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe
          4⤵
          • Executes dropped EXE
          • Adds Run key to start application
          PID:1420

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

    Filesize

    119KB

    MD5

    5af375225260c3045ce0e342c91da903

    SHA1

    0060c2f92a1140719a803937e2c49fb99fb2cf55

    SHA256

    ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc

    SHA512

    40ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae

  • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

    Filesize

    119KB

    MD5

    5af375225260c3045ce0e342c91da903

    SHA1

    0060c2f92a1140719a803937e2c49fb99fb2cf55

    SHA256

    ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc

    SHA512

    40ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae

  • C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

    Filesize

    119KB

    MD5

    5af375225260c3045ce0e342c91da903

    SHA1

    0060c2f92a1140719a803937e2c49fb99fb2cf55

    SHA256

    ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc

    SHA512

    40ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae

  • \Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

    Filesize

    119KB

    MD5

    5af375225260c3045ce0e342c91da903

    SHA1

    0060c2f92a1140719a803937e2c49fb99fb2cf55

    SHA256

    ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc

    SHA512

    40ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae

  • \Users\Admin\AppData\Roaming\Microsoft\taskhost.exe

    Filesize

    119KB

    MD5

    5af375225260c3045ce0e342c91da903

    SHA1

    0060c2f92a1140719a803937e2c49fb99fb2cf55

    SHA256

    ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc

    SHA512

    40ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae

  • memory/1360-54-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1360-60-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1360-59-0x0000000075611000-0x0000000075613000-memory.dmp

    Filesize

    8KB

  • memory/1360-56-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1360-74-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB

  • memory/1420-75-0x0000000000400000-0x0000000000429000-memory.dmp

    Filesize

    164KB