Analysis
-
max time kernel
106s -
max time network
112s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
13-01-2021 12:12
Static task
static1
Behavioral task
behavioral1
Sample
Statement of Account.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
Statement of Account.exe
Resource
win10v20201028
General
-
Target
Statement of Account.exe
-
Size
808KB
-
MD5
8d7144cdca415dbdf39548d460a8866b
-
SHA1
7a37f9f0728708811235437d69fb74579548f758
-
SHA256
fa769a960a22d4ce289da152e5535fa6f9e610d8796aeb907bacf3157c1270b5
-
SHA512
955ae6fcd4bd5f77a5ea376fbbf7827315baf73bdfcefb5f519944398dcb700ea9f22218176624d89f0fd523ff34dccccad4139e1c8e6142d1f295e0f67498f0
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
Processes:
Statement of Account.exedescription pid process target process PID 504 set thread context of 3200 504 Statement of Account.exe MSBuild.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 11 IoCs
Processes:
Statement of Account.exeMSBuild.exepid process 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 504 Statement of Account.exe 3200 MSBuild.exe 3200 MSBuild.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
Statement of Account.exeMSBuild.exedescription pid process Token: SeDebugPrivilege 504 Statement of Account.exe Token: SeDebugPrivilege 3200 MSBuild.exe -
Suspicious use of WriteProcessMemory 23 IoCs
Processes:
Statement of Account.exedescription pid process target process PID 504 wrote to memory of 2044 504 Statement of Account.exe schtasks.exe PID 504 wrote to memory of 2044 504 Statement of Account.exe schtasks.exe PID 504 wrote to memory of 2044 504 Statement of Account.exe schtasks.exe PID 504 wrote to memory of 3016 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3016 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3016 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 744 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 744 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 744 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3052 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3052 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3052 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 1332 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 1332 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 1332 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe PID 504 wrote to memory of 3200 504 Statement of Account.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Statement of Account.exe"C:\Users\Admin\AppData\Local\Temp\Statement of Account.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:504 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\eRwRffX" /XML "C:\Users\Admin\AppData\Local\Temp\tmp5B30.tmp"2⤵
- Creates scheduled task(s)
PID:2044 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:3016
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:744
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:3052
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1332
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:3200
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp5B30.tmpMD5
066c5280a69ad6ab833cbe2955fa457c
SHA137fc6e76ae917bb02b0eeec7375b3cc391d6464e
SHA2567cff9a641cf669349ab617558ef825865791c53fce09612752f1702442367206
SHA512fef590164caffa8554d1321c6fe3bb56492b84628e1418fde0f0479af021bd6ee72315ec5b630ce1e92715b0c9b7d29c8147f90880c5b656e509c3521a358220
-
memory/504-6-0x0000000005560000-0x0000000005561000-memory.dmpFilesize
4KB
-
memory/504-3-0x0000000000BE0000-0x0000000000BE1000-memory.dmpFilesize
4KB
-
memory/504-2-0x0000000073D40000-0x000000007442E000-memory.dmpFilesize
6.9MB
-
memory/504-7-0x0000000005600000-0x0000000005601000-memory.dmpFilesize
4KB
-
memory/504-8-0x0000000003170000-0x0000000003171000-memory.dmpFilesize
4KB
-
memory/504-9-0x00000000031F0000-0x0000000003202000-memory.dmpFilesize
72KB
-
memory/504-10-0x0000000001680000-0x00000000016F3000-memory.dmpFilesize
460KB
-
memory/504-5-0x0000000005BF0000-0x0000000005BF1000-memory.dmpFilesize
4KB
-
memory/2044-11-0x0000000000000000-mapping.dmp
-
memory/3200-13-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3200-14-0x000000000043760E-mapping.dmp
-
memory/3200-15-0x0000000073D40000-0x000000007442E000-memory.dmpFilesize
6.9MB
-
memory/3200-20-0x0000000005540000-0x0000000005541000-memory.dmpFilesize
4KB
-
memory/3200-21-0x00000000059D0000-0x00000000059D1000-memory.dmpFilesize
4KB