Analysis
-
max time kernel
60s -
max time network
14s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
04-12-2020 19:27
Static task
static1
Behavioral task
behavioral1
Sample
a96253a4b8d3dc0d9cece5aa9145813d.exe
Resource
win7v20201028
General
-
Target
a96253a4b8d3dc0d9cece5aa9145813d.exe
-
Size
926KB
-
MD5
a96253a4b8d3dc0d9cece5aa9145813d
-
SHA1
1d318d45b369768974b793415243b2f120ac21da
-
SHA256
9603997de7895ccfbd7b9493e7c64a9a089adc98a4929308ff74f18e88f9eac7
-
SHA512
92b6695b9e0078433f7f02e4a7542d1082280c92fbe5580815faf79ff3e0671ed4aea4489a354a382025363d91911665080a8f87286dd2332ce3cb3e5a409921
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 10 IoCs
Processes:
a96253a4b8d3dc0d9cece5aa9145813d.exepid process 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe 476 a96253a4b8d3dc0d9cece5aa9145813d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
a96253a4b8d3dc0d9cece5aa9145813d.exedescription pid process Token: SeDebugPrivilege 476 a96253a4b8d3dc0d9cece5aa9145813d.exe -
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
a96253a4b8d3dc0d9cece5aa9145813d.exedescription pid process target process PID 476 wrote to memory of 1688 476 a96253a4b8d3dc0d9cece5aa9145813d.exe schtasks.exe PID 476 wrote to memory of 1688 476 a96253a4b8d3dc0d9cece5aa9145813d.exe schtasks.exe PID 476 wrote to memory of 1688 476 a96253a4b8d3dc0d9cece5aa9145813d.exe schtasks.exe PID 476 wrote to memory of 1688 476 a96253a4b8d3dc0d9cece5aa9145813d.exe schtasks.exe PID 476 wrote to memory of 908 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 908 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 908 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 908 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1668 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1668 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1668 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1668 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 392 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 392 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 392 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 392 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 520 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 520 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 520 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 520 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1060 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1060 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1060 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe PID 476 wrote to memory of 1060 476 a96253a4b8d3dc0d9cece5aa9145813d.exe a96253a4b8d3dc0d9cece5aa9145813d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\TNKpefNs" /XML "C:\Users\Admin\AppData\Local\Temp\tmpE9C3.tmp"2⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"2⤵
-
C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"C:\Users\Admin\AppData\Local\Temp\a96253a4b8d3dc0d9cece5aa9145813d.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpE9C3.tmpMD5
5206fdbeb7e8fd3cc9e0d1202a062e38
SHA196d282f00989b16c93a2e454dd8099e6e88beef8
SHA2565b70e4e3b58306beac297abc2987b48f35b776a595e3c45d0f5130a1b76fb4ab
SHA5127a406dc64d8afd0e4e59ecb9bb493119e626f44fbee1bf8c9e6ab9a80d7e23224147cfe568c6dbec24778023e25936e41ffe63622e0b97b39bae52b0e81dd6c7
-
memory/476-2-0x0000000073F20000-0x000000007460E000-memory.dmpFilesize
6.9MB
-
memory/476-3-0x00000000003D0000-0x00000000003D1000-memory.dmpFilesize
4KB
-
memory/476-5-0x0000000025840000-0x0000000045828000-memory.dmpFilesize
511.9MB
-
memory/476-6-0x00000000020A0000-0x00000000020EF000-memory.dmpFilesize
316KB
-
memory/476-7-0x00000000006E0000-0x00000000006E8000-memory.dmpFilesize
32KB
-
memory/476-9-0x0000000002130000-0x0000000002161000-memory.dmpFilesize
196KB
-
memory/1688-10-0x0000000000000000-mapping.dmp