Analysis
-
max time kernel
241s -
max time network
240s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
11-01-2021 13:09
Static task
static1
Behavioral task
behavioral1
Sample
4ced2056e4efe1c93b9f4adaaeaba20c.exe
Resource
win7v20201028
windows7_x64
0 signatures
0 seconds
General
-
Target
4ced2056e4efe1c93b9f4adaaeaba20c.exe
-
Size
607KB
-
MD5
4ced2056e4efe1c93b9f4adaaeaba20c
-
SHA1
b975777c42d7d8fb04c34a2efc64dc5e4c574712
-
SHA256
f6a307d243c407c27489de37adac83e9205be531cbb4e2cb71545627faf813fd
-
SHA512
014df0ad54bf23335f964fa4e313a91b60b3ea2c62b73a306e973177830b573666aaebc1932cafa766042f34b8e32adcfabe3027aae2cc09341fd138a8963eaf
Score
8/10
Malware Config
Signatures
-
Disables Task Manager via registry modification
-
Executes dropped EXE 3 IoCs
pid Process 1768 HoykwG9pmLZ7sZbSP8eb.exe 952 winrar-x84.exe 1224 WmiPrvSE.exe -
Loads dropped DLL 2 IoCs
pid Process 1988 cmd.exe 692 cmd.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\WmiPrvSE.exe winrar-x84.exe File created C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\24dbde2999530ef5fd907494bc374d663924116c winrar-x84.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\Downloaded Program Files\taskhost.exe winrar-x84.exe File created C:\Windows\Downloaded Program Files\b75386f1303e64d8139363b71e44ac16341adf4e winrar-x84.exe -
Creates scheduled task(s) 1 TTPs 7 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1140 schtasks.exe 1996 schtasks.exe 1236 schtasks.exe 1712 schtasks.exe 308 schtasks.exe 1616 schtasks.exe 1228 schtasks.exe -
Modifies registry key 1 TTPs 1 IoCs
pid Process 1524 reg.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 952 winrar-x84.exe 1224 WmiPrvSE.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 952 winrar-x84.exe Token: SeDebugPrivilege 1224 WmiPrvSE.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 1660 wrote to memory of 1248 1660 4ced2056e4efe1c93b9f4adaaeaba20c.exe 26 PID 1660 wrote to memory of 1248 1660 4ced2056e4efe1c93b9f4adaaeaba20c.exe 26 PID 1660 wrote to memory of 1248 1660 4ced2056e4efe1c93b9f4adaaeaba20c.exe 26 PID 1660 wrote to memory of 1248 1660 4ced2056e4efe1c93b9f4adaaeaba20c.exe 26 PID 1248 wrote to memory of 1988 1248 WScript.exe 27 PID 1248 wrote to memory of 1988 1248 WScript.exe 27 PID 1248 wrote to memory of 1988 1248 WScript.exe 27 PID 1248 wrote to memory of 1988 1248 WScript.exe 27 PID 1988 wrote to memory of 1768 1988 cmd.exe 29 PID 1988 wrote to memory of 1768 1988 cmd.exe 29 PID 1988 wrote to memory of 1768 1988 cmd.exe 29 PID 1988 wrote to memory of 1768 1988 cmd.exe 29 PID 1768 wrote to memory of 1524 1768 HoykwG9pmLZ7sZbSP8eb.exe 31 PID 1768 wrote to memory of 1524 1768 HoykwG9pmLZ7sZbSP8eb.exe 31 PID 1768 wrote to memory of 1524 1768 HoykwG9pmLZ7sZbSP8eb.exe 31 PID 1768 wrote to memory of 1524 1768 HoykwG9pmLZ7sZbSP8eb.exe 31 PID 1524 wrote to memory of 692 1524 WScript.exe 35 PID 1524 wrote to memory of 692 1524 WScript.exe 35 PID 1524 wrote to memory of 692 1524 WScript.exe 35 PID 1524 wrote to memory of 692 1524 WScript.exe 35 PID 692 wrote to memory of 952 692 cmd.exe 36 PID 692 wrote to memory of 952 692 cmd.exe 36 PID 692 wrote to memory of 952 692 cmd.exe 36 PID 692 wrote to memory of 952 692 cmd.exe 36 PID 952 wrote to memory of 308 952 winrar-x84.exe 38 PID 952 wrote to memory of 308 952 winrar-x84.exe 38 PID 952 wrote to memory of 308 952 winrar-x84.exe 38 PID 952 wrote to memory of 1616 952 winrar-x84.exe 40 PID 952 wrote to memory of 1616 952 winrar-x84.exe 40 PID 952 wrote to memory of 1616 952 winrar-x84.exe 40 PID 952 wrote to memory of 1228 952 winrar-x84.exe 42 PID 952 wrote to memory of 1228 952 winrar-x84.exe 42 PID 952 wrote to memory of 1228 952 winrar-x84.exe 42 PID 952 wrote to memory of 1140 952 winrar-x84.exe 44 PID 952 wrote to memory of 1140 952 winrar-x84.exe 44 PID 952 wrote to memory of 1140 952 winrar-x84.exe 44 PID 952 wrote to memory of 1996 952 winrar-x84.exe 46 PID 952 wrote to memory of 1996 952 winrar-x84.exe 46 PID 952 wrote to memory of 1996 952 winrar-x84.exe 46 PID 952 wrote to memory of 1236 952 winrar-x84.exe 48 PID 952 wrote to memory of 1236 952 winrar-x84.exe 48 PID 952 wrote to memory of 1236 952 winrar-x84.exe 48 PID 952 wrote to memory of 1712 952 winrar-x84.exe 50 PID 952 wrote to memory of 1712 952 winrar-x84.exe 50 PID 952 wrote to memory of 1712 952 winrar-x84.exe 50 PID 952 wrote to memory of 1224 952 winrar-x84.exe 52 PID 952 wrote to memory of 1224 952 winrar-x84.exe 52 PID 952 wrote to memory of 1224 952 winrar-x84.exe 52 PID 692 wrote to memory of 1524 692 cmd.exe 53 PID 692 wrote to memory of 1524 692 cmd.exe 53 PID 692 wrote to memory of 1524 692 cmd.exe 53 PID 692 wrote to memory of 1524 692 cmd.exe 53
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ced2056e4efe1c93b9f4adaaeaba20c.exe"C:\Users\Admin\AppData\Local\Temp\4ced2056e4efe1c93b9f4adaaeaba20c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1660 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\wSmIzsMZSTGIPjXygtTeiEZYkIjJjD.vbe"2⤵
- Suspicious use of WriteProcessMemory
PID:1248 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\WinRAR\wAcLjfo4uMcnTa1rAjnz0eLcoo04D9.bat" "3⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Users\Admin\AppData\Roaming\WinRAR\HoykwG9pmLZ7sZbSP8eb.exeHoykwG9pmLZ7sZbSP8eb.exe -p2e840a597483ac4423c7c5ec1a09b39042cbf75d4⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Windows\SysWOW64\WScript.exe"C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Roaming\WinRAR\tPKG2uMJtmCS4Bv6TMepBvdoqxAPGa.vbe"5⤵
- Suspicious use of WriteProcessMemory
PID:1524 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Roaming\WinRAR\mQE440b4P9lIBPO3Qboqf8inqaQoJr.bat" "6⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Roaming\WinRAR\winrar-x84.exe"C:\Users\Admin\AppData\Roaming\WinRAR\winrar-x84.exe"7⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\Recovery\a7611f42-198c-11eb-8a49-ee401b9e63cb\explorer.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:308
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "smss" /sc ONLOGON /tr "'C:\PerfLogs\Admin\smss.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1616
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "taskhost" /sc ONLOGON /tr "'C:\Windows\Downloaded Program Files\taskhost.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1228
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Documents and Settings\spoolsv.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1140
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "winrar-x84" /sc ONLOGON /tr "'C:\ProgramData\Favorites\winrar-x84.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1996
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "winrar-x84" /sc ONLOGON /tr "'C:\Recovery\a7611f42-198c-11eb-8a49-ee401b9e63cb\winrar-x84.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1236
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /tn "WmiPrvSE" /sc ONLOGON /tr "'C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\WmiPrvSE.exe'" /rl HIGHEST /f8⤵
- Creates scheduled task(s)
PID:1712
-
-
C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\WmiPrvSE.exe"C:\Program Files\MSBuild\Microsoft\Windows Workflow Foundation\v3.0\WmiPrvSE.exe"8⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1224
-
-
-
C:\Windows\SysWOW64\reg.exereg add HKCU\Software\Microsoft\Windows\CurrentVersion\Policies\System /v DisableTaskMgr /t REG_DWORD /d 1 /f7⤵
- Modifies registry key
PID:1524
-
-
-
-
-
-