Analysis
-
max time kernel
144s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20231222-en -
resource tags
arch:x64arch:x86image:win10v2004-20231222-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2024 14:19
Static task
static1
Behavioral task
behavioral1
Sample
800d9d59933f8d0bb5ec216e7c47c846.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
800d9d59933f8d0bb5ec216e7c47c846.exe
Resource
win10v2004-20231222-en
General
-
Target
800d9d59933f8d0bb5ec216e7c47c846.exe
-
Size
128KB
-
MD5
800d9d59933f8d0bb5ec216e7c47c846
-
SHA1
5fd625f3c1218d11d392b5d0ed59b1a33668225b
-
SHA256
3e1e31531a48d63bdce10c93795ce0beb3efdc2ef41d30e1c4260fb8a9a2b65a
-
SHA512
e93d152646bfb548688e90ba103b6601844cd4fe2d47452df5df7e11db8867d469fae5feaa131892b95d66805d7c29ebebb3b6d6da0ab23a4f1d42081d19bc72
-
SSDEEP
3072:+jzqti6vVnmDym+AVEzihGT9B4h2KHgOY3:m9junqEzBT9qh2KHvY3
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4952 taskhost.exe 4460 taskhost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3803511929-1339359695-2191195476-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Taskhost = "C:\\Users\\Admin\\AppData\\Roaming\\taskhost.exe" 800d9d59933f8d0bb5ec216e7c47c846.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4084 set thread context of 3880 4084 800d9d59933f8d0bb5ec216e7c47c846.exe 86 PID 4952 set thread context of 4460 4952 taskhost.exe 89 -
Program crash 2 IoCs
pid pid_target Process procid_target 5540 4084 WerFault.exe 42 1184 4952 WerFault.exe -
Suspicious use of WriteProcessMemory 13 IoCs
description pid Process procid_target PID 4084 wrote to memory of 3880 4084 800d9d59933f8d0bb5ec216e7c47c846.exe 86 PID 4084 wrote to memory of 3880 4084 800d9d59933f8d0bb5ec216e7c47c846.exe 86 PID 4084 wrote to memory of 3880 4084 800d9d59933f8d0bb5ec216e7c47c846.exe 86 PID 4084 wrote to memory of 3880 4084 800d9d59933f8d0bb5ec216e7c47c846.exe 86 PID 4084 wrote to memory of 3880 4084 800d9d59933f8d0bb5ec216e7c47c846.exe 86 PID 3880 wrote to memory of 4952 3880 800d9d59933f8d0bb5ec216e7c47c846.exe 94 PID 3880 wrote to memory of 4952 3880 800d9d59933f8d0bb5ec216e7c47c846.exe 94 PID 3880 wrote to memory of 4952 3880 800d9d59933f8d0bb5ec216e7c47c846.exe 94 PID 4952 wrote to memory of 4460 4952 taskhost.exe 89 PID 4952 wrote to memory of 4460 4952 taskhost.exe 89 PID 4952 wrote to memory of 4460 4952 taskhost.exe 89 PID 4952 wrote to memory of 4460 4952 taskhost.exe 89 PID 4952 wrote to memory of 4460 4952 taskhost.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\800d9d59933f8d0bb5ec216e7c47c846.exe"C:\Users\Admin\AppData\Local\Temp\800d9d59933f8d0bb5ec216e7c47c846.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4084 -
C:\Users\Admin\AppData\Local\Temp\800d9d59933f8d0bb5ec216e7c47c846.exeC:\Users\Admin\AppData\Local\Temp\800d9d59933f8d0bb5ec216e7c47c846.exe2⤵
- Adds Run key to start application
- Suspicious use of WriteProcessMemory
PID:3880 -
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4084 -s 2922⤵
- Program crash
PID:5540
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4084 -ip 40841⤵PID:3504
-
C:\Users\Admin\AppData\Roaming\taskhost.exeC:\Users\Admin\AppData\Roaming\taskhost.exe1⤵
- Executes dropped EXE
PID:4460
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 444 -p 4952 -ip 49521⤵PID:3892
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4952 -s 2921⤵
- Program crash
PID:1184
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
128KB
MD5fd3e5090e802597ec62080e605324f3b
SHA1a84025a6f1a1cc4ee192299de2316df6e209ead4
SHA2564f18f6ed5c2fae0711705ea13c891925e627bdca9ee13d132eec8fdd06aa9fb9
SHA512c193c3970ff6a9e2b97dda2f9ca121b6e119bb43f7eba4450b8a9f66aee0f11bba7f503080220d3c28442dc17b355d0fcaf7afe5f12a6a78d979a3434a789385