Analysis
-
max time kernel
145s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
30/12/2023, 21:03
Static task
static1
Behavioral task
behavioral1
Sample
1c6ae563b2c94e980afd2959051211c8.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
1c6ae563b2c94e980afd2959051211c8.exe
Resource
win10v2004-20231215-en
General
-
Target
1c6ae563b2c94e980afd2959051211c8.exe
-
Size
524KB
-
MD5
1c6ae563b2c94e980afd2959051211c8
-
SHA1
e4207761301d003f5be6d842ac7cb7da92065bdf
-
SHA256
5f1f01835e23dc12848d99026f8db2f980cbdf80dfef7101a189a6b366513738
-
SHA512
812d549b906f6b80e9918d61116ab32377a46098db53537563b9e917235d1f274d1d5af9d17d9a5cb001ebe6f10a199f0b4a9090fdf9f78b6e5168076c0d3060
-
SSDEEP
12288:2kDgRwZ3AJebm6k93MlR9QukBq6xGJOpqERypiI3i/XUJot:242JeSd93Mxx0GkpGpvkXU
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1972 scvhost.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1972 set thread context of 1720 1972 scvhost.exe 97 -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\system\scvhost.exe 1c6ae563b2c94e980afd2959051211c8.exe File opened for modification C:\Windows\system\scvhost.exe 1c6ae563b2c94e980afd2959051211c8.exe -
Program crash 1 IoCs
pid pid_target Process 2660 1720 WerFault.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4020 wrote to memory of 2576 4020 1c6ae563b2c94e980afd2959051211c8.exe 98 PID 4020 wrote to memory of 2576 4020 1c6ae563b2c94e980afd2959051211c8.exe 98 PID 4020 wrote to memory of 2576 4020 1c6ae563b2c94e980afd2959051211c8.exe 98 PID 1972 wrote to memory of 1720 1972 scvhost.exe 97 PID 1972 wrote to memory of 1720 1972 scvhost.exe 97 PID 1972 wrote to memory of 1720 1972 scvhost.exe 97 PID 1972 wrote to memory of 1720 1972 scvhost.exe 97 PID 1972 wrote to memory of 1720 1972 scvhost.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\1c6ae563b2c94e980afd2959051211c8.exe"C:\Users\Admin\AppData\Local\Temp\1c6ae563b2c94e980afd2959051211c8.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:4020 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\4915.bat2⤵PID:2576
-
-
C:\Windows\system\scvhost.exeC:\Windows\system\scvhost.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\svchost.exe"C:\Windows\system32\svchost.exe" 123452⤵PID:1720
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 448 -p 1720 -ip 17201⤵PID:2656
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1720 -s 121⤵
- Program crash
PID:2660
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
198B
MD5f1d540d3f48ef15749935f1b3fcd4bfc
SHA1d12c9bf75ca34ee840646b28f914fece95f27a1e
SHA25685c9bb29655a0a2c45cd5a11a6ab5b028d631bfe85a32b49010849cb956b3fc1
SHA512447b93ccb8178676d7c9ed288ba3e28430d168371ffda2384a06bc5fd889ccc47cd8a0df71112ff9299cdcff9485af578482c756b5aa48c51b20d02ed1d12095
-
Filesize
524KB
MD51c6ae563b2c94e980afd2959051211c8
SHA1e4207761301d003f5be6d842ac7cb7da92065bdf
SHA2565f1f01835e23dc12848d99026f8db2f980cbdf80dfef7101a189a6b366513738
SHA512812d549b906f6b80e9918d61116ab32377a46098db53537563b9e917235d1f274d1d5af9d17d9a5cb001ebe6f10a199f0b4a9090fdf9f78b6e5168076c0d3060
-
Filesize
442KB
MD58a107c6b654c1ea00dda0820385025c1
SHA137b89275c6a96e3576f47c3e8940b03036abdae9
SHA2567ae5defc2e1a37489aacf3d9f4f975ce6d6a1159eb5c952097a9b979ac09ab9a
SHA51290911271fbff35ffecce2ca5a26a63754c3d2264f505c12a6c2fc6e74cc469f6cdf11bcf5ba597bdf3724b931506e0f53038bc850cc0e14cf267509a6b8b4cdd