Analysis
-
max time kernel
182s -
max time network
227s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
05/12/2022, 13:09
Static task
static1
Behavioral task
behavioral1
Sample
853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe
Resource
win10v2004-20221111-en
General
-
Target
853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe
-
Size
119KB
-
MD5
2113792abb4900e63bd206558ec0fec0
-
SHA1
ef3d0401be4048661889b1ef92e57fec1541dec7
-
SHA256
853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946
-
SHA512
b03a0b8ac5c8e57a8beb41ce4b45257e65c918c2021d17aba48ac089bd40cedf3b382487ba84e67334a28c824406d08f20fc4df5d9c3f1c46041e6058f807908
-
SSDEEP
1536:/xpaqPur9ZAPYXQL5rJEznVo4aWdyYTqbmBupoexeQFQB0s31ZWfJeCNLWNSJw3b:6XXQL5rin2EyuE9ouerB0wWJgvUmL1
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 624 taskhost.exe 1420 taskhost.exe -
Loads dropped DLL 2 IoCs
pid Process 1360 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 1360 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run taskhost.exe Set value (str) \REGISTRY\USER\S-1-5-21-3406023954-474543476-3319432036-1000\Software\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\Microsoft\\taskhost.exe" taskhost.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1828 set thread context of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 624 set thread context of 1420 624 taskhost.exe 30 -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1828 wrote to memory of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 1828 wrote to memory of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 1828 wrote to memory of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 1828 wrote to memory of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 1828 wrote to memory of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 1828 wrote to memory of 1360 1828 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 28 PID 1360 wrote to memory of 624 1360 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 29 PID 1360 wrote to memory of 624 1360 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 29 PID 1360 wrote to memory of 624 1360 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 29 PID 1360 wrote to memory of 624 1360 853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe 29 PID 624 wrote to memory of 1420 624 taskhost.exe 30 PID 624 wrote to memory of 1420 624 taskhost.exe 30 PID 624 wrote to memory of 1420 624 taskhost.exe 30 PID 624 wrote to memory of 1420 624 taskhost.exe 30 PID 624 wrote to memory of 1420 624 taskhost.exe 30 PID 624 wrote to memory of 1420 624 taskhost.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe"C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exeC:\Users\Admin\AppData\Local\Temp\853a0e263be0f539e5583ace92be0b69e877ebaf7923a26d061084a8157dd946.exe2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1360 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exeC:\Users\Admin\AppData\Roaming\Microsoft\taskhost.exe4⤵
- Executes dropped EXE
- Adds Run key to start application
PID:1420
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
119KB
MD55af375225260c3045ce0e342c91da903
SHA10060c2f92a1140719a803937e2c49fb99fb2cf55
SHA256ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc
SHA51240ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae
-
Filesize
119KB
MD55af375225260c3045ce0e342c91da903
SHA10060c2f92a1140719a803937e2c49fb99fb2cf55
SHA256ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc
SHA51240ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae
-
Filesize
119KB
MD55af375225260c3045ce0e342c91da903
SHA10060c2f92a1140719a803937e2c49fb99fb2cf55
SHA256ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc
SHA51240ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae
-
Filesize
119KB
MD55af375225260c3045ce0e342c91da903
SHA10060c2f92a1140719a803937e2c49fb99fb2cf55
SHA256ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc
SHA51240ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae
-
Filesize
119KB
MD55af375225260c3045ce0e342c91da903
SHA10060c2f92a1140719a803937e2c49fb99fb2cf55
SHA256ad1f0efd71bef1ee8c4126ce5380068a2db63f369dfc8c83c5130ab4e7a85acc
SHA51240ace03bf4be5d92641a7b7553ff09dd58881a4c9b226acaef3c3272e0192e6f6599a0a579016f7c923163c058cacdcaea47d87016674ca22a01c5d4d855e8ae