Analysis
-
max time kernel
263s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
26-12-2022 22:17
Static task
static1
Behavioral task
behavioral1
Sample
dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe
Resource
win10-20220901-en
General
-
Target
dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe
-
Size
6.1MB
-
MD5
917705dd2cbe49fdc73e02a1a4c72028
-
SHA1
1646aa0966f02eb72f0abd62ac0095db0d6d7e4f
-
SHA256
dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe
-
SHA512
ca5f3894cd85a79c56e7203f9b95476d03fb10d8c87f544def5193f60649ed8d5d2dcf1f0853fb8a72648280397cbb6a908e285c9436fca69852c3fdf81b28f2
-
SSDEEP
196608:tF36cDVpvIoR9ALI9mQgQsiuerZnAS4Um:tpfDHIojBu6ZnR4U
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1000 SearchFilterHost.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 4 IoCs
pid Process 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 1000 SearchFilterHost.exe 1000 SearchFilterHost.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 852 1460 WerFault.exe 27 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1988 schtasks.exe 1540 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 1000 SearchFilterHost.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 1460 wrote to memory of 1988 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 28 PID 1460 wrote to memory of 1988 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 28 PID 1460 wrote to memory of 1988 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 28 PID 1460 wrote to memory of 1988 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 28 PID 1460 wrote to memory of 856 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 30 PID 1460 wrote to memory of 856 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 30 PID 1460 wrote to memory of 856 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 30 PID 1460 wrote to memory of 856 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 30 PID 1460 wrote to memory of 852 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 33 PID 1460 wrote to memory of 852 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 33 PID 1460 wrote to memory of 852 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 33 PID 1460 wrote to memory of 852 1460 dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe 33 PID 1704 wrote to memory of 1000 1704 taskeng.exe 35 PID 1704 wrote to memory of 1000 1704 taskeng.exe 35 PID 1704 wrote to memory of 1000 1704 taskeng.exe 35 PID 1704 wrote to memory of 1000 1704 taskeng.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe"C:\Users\Admin\AppData\Local\Temp\dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1460 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Microsoft Windows Search Filter Host{A2S3C4V5G2S2-H5F4S2B6-N7F3S2A1H5}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SearchFilterHost\SearchFilterHost.exe"2⤵
- Creates scheduled task(s)
PID:1988
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Microsoft Windows Search Filter Host{A2S3C4V5G2S2-H5F4S2B6-N7F3S2A1H5}"2⤵PID:856
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Microsoft Windows Search Filter Host{A2S3C4V5G2S2-H5F4S2B6-N7F3S2A1H5}" /XML "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SearchFilterHost\24357587698645335"2⤵
- Creates scheduled task(s)
PID:1540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1460 -s 1922⤵
- Program crash
PID:852
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {3D101C27-5D9A-4817-BDC2-C8EF16804F04} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1704 -
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\SearchFilterHost\SearchFilterHost.exeC:\Users\Admin\AppData\Roaming\Microsoft\Windows\SearchFilterHost\SearchFilterHost.exe2⤵
- Executes dropped EXE
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
PID:1000
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
6.1MB
MD5917705dd2cbe49fdc73e02a1a4c72028
SHA11646aa0966f02eb72f0abd62ac0095db0d6d7e4f
SHA256dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe
SHA512ca5f3894cd85a79c56e7203f9b95476d03fb10d8c87f544def5193f60649ed8d5d2dcf1f0853fb8a72648280397cbb6a908e285c9436fca69852c3fdf81b28f2
-
Filesize
6.1MB
MD5917705dd2cbe49fdc73e02a1a4c72028
SHA11646aa0966f02eb72f0abd62ac0095db0d6d7e4f
SHA256dcbec7b1eeba2de23c87b2c44539b4a2421d880ff0fd2d66194a906dc73cc1fe
SHA512ca5f3894cd85a79c56e7203f9b95476d03fb10d8c87f544def5193f60649ed8d5d2dcf1f0853fb8a72648280397cbb6a908e285c9436fca69852c3fdf81b28f2