Analysis
-
max time kernel
146s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
28-01-2024 22:25
Static task
static1
Behavioral task
behavioral1
Sample
7e2a06ab8b923fc928f0cd9a6ed745c2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7e2a06ab8b923fc928f0cd9a6ed745c2.exe
Resource
win10v2004-20231222-en
General
-
Target
7e2a06ab8b923fc928f0cd9a6ed745c2.exe
-
Size
136KB
-
MD5
7e2a06ab8b923fc928f0cd9a6ed745c2
-
SHA1
01c08af6213c86e0b75e93cd497fa51e4cacb34c
-
SHA256
4a0a3e22f43c7579d9108f93de2d5e755fb23ae67c910278af76cf77afff3654
-
SHA512
dcb6d2c460e48580efb6b17fb0f1e9027a14d2f273e756e2f5cc11478a901273109853bde3ab55de9ddec7dabc0952e74c9962ea1f72dab2e99417374c217214
-
SSDEEP
3072:AOqbgt6rdx5chjgMVYvEJnateb8SVPIR+x/Kr:cbd+3CvUatjS0+tKr
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2572 taskhost.exe 4792 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 7e2a06ab8b923fc928f0cd9a6ed745c2.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 2336 set thread context of 3864 2336 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 25 PID 2572 set thread context of 4792 2572 taskhost.exe 21 -
Program crash 2 IoCs
pid pid_target Process procid_target 3552 2336 WerFault.exe 14 3116 2572 WerFault.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 2336 wrote to memory of 3864 2336 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 25 PID 2336 wrote to memory of 3864 2336 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 25 PID 2336 wrote to memory of 3864 2336 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 25 PID 2336 wrote to memory of 3864 2336 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 25 PID 2336 wrote to memory of 3864 2336 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 25 PID 3864 wrote to memory of 2572 3864 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 22 PID 3864 wrote to memory of 2572 3864 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 22 PID 3864 wrote to memory of 2572 3864 7e2a06ab8b923fc928f0cd9a6ed745c2.exe 22 PID 2572 wrote to memory of 4792 2572 taskhost.exe 21 PID 2572 wrote to memory of 4792 2572 taskhost.exe 21 PID 2572 wrote to memory of 4792 2572 taskhost.exe 21 PID 2572 wrote to memory of 4792 2572 taskhost.exe 21 PID 2572 wrote to memory of 4792 2572 taskhost.exe 21
Processes
-
C:\Users\Admin\AppData\Local\Temp\7e2a06ab8b923fc928f0cd9a6ed745c2.exe"C:\Users\Admin\AppData\Local\Temp\7e2a06ab8b923fc928f0cd9a6ed745c2.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2336 -s 2962⤵
- Program crash
PID:3552
-
-
C:\Users\Admin\AppData\Local\Temp\7e2a06ab8b923fc928f0cd9a6ed745c2.exeC:\Users\Admin\AppData\Local\Temp\7e2a06ab8b923fc928f0cd9a6ed745c2.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3864
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 2921⤵
- Program crash
PID:3116
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 424 -p 2572 -ip 25721⤵PID:3968
-
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe1⤵
- Executes dropped EXE
PID:4792
-
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2572
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 360 -p 2336 -ip 23361⤵PID:3984
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
65KB
MD58471184df3294c3d08884df8fb78bf98
SHA1e1e4062c68031909d7ee84c1216f61ee2c2af5b5
SHA2567d04ca1f7684c400415e98d14ddbb35c71f0ffcebd7f97a7121a60083673d974
SHA5123fbadb56156026b4ce6d089674f652435c1b60bd9b00fb7e5c2786c0534e6858c126c103a2f6e002d5484ccc9668cc50250195fbd46248ff66914475db6addee
-
Filesize
63KB
MD52aca10e56998c4dad50c23bfd74ffc6a
SHA1981fc97cefef0f91d18c892ffb37239288619a34
SHA25621b3106c78f60098b195737abbd3bf5137150ab94b9a78d91e901b887b8bed58
SHA51223485d8f561533ecd9d8c192a31c00dbfdeb559280ae3c798e2547b8769f7ea232cb98564db44704ef97d8f3f06883514b9ddcf9d412a1391e80250f4af65aba
-
Filesize
12KB
MD587621c092d1b29c869f54131f4c7e3c7
SHA165dfd55624fba94e9e67cc2e4fae343324b608ad
SHA256387c6f2c004a77d2b81d130f40bf15b2821d7bccc38b1658405f600baac872af
SHA512e8c2ddac2ff39ca4216eeaaaa1d58fcfe260f7acb91e47a5903ece6d2f59f9f635a674f30b7aa04bc199e730cc8790ca79fa49b9011c7d32235e332a0c6956cb