Analysis
-
max time kernel
122s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 09:45
Static task
static1
Behavioral task
behavioral1
Sample
0e4551b1546fa898c55b2511d9fca86d.exe
Resource
win7v20201028
General
-
Target
0e4551b1546fa898c55b2511d9fca86d.exe
-
Size
853KB
-
MD5
0e4551b1546fa898c55b2511d9fca86d
-
SHA1
51a6d274b1283640e248431bd887ef1f170371f9
-
SHA256
1c55b3c97920d56dddbc38e6ba3c5dcbc7f3072792915b51e146b3dd92b3f392
-
SHA512
ed09f78fbda757a1e154541c0ef2588bec2e6af6889246dcfaff2fa2ba78169edbcccdc1ada228555abe233d1ab69aa375288452e9cc90d7c502eb322353706a
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SMTP Manager = "C:\\Program Files (x86)\\SMTP Manager\\smtpmgr.exe" 0e4551b1546fa898c55b2511d9fca86d.exe -
Processes:
0e4551b1546fa898c55b2511d9fca86d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0e4551b1546fa898c55b2511d9fca86d.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exedescription pid process target process PID 1400 set thread context of 3268 1400 0e4551b1546fa898c55b2511d9fca86d.exe 0e4551b1546fa898c55b2511d9fca86d.exe -
Drops file in Program Files directory 2 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exedescription ioc process File created C:\Program Files (x86)\SMTP Manager\smtpmgr.exe 0e4551b1546fa898c55b2511d9fca86d.exe File opened for modification C:\Program Files (x86)\SMTP Manager\smtpmgr.exe 0e4551b1546fa898c55b2511d9fca86d.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exepid process 3268 0e4551b1546fa898c55b2511d9fca86d.exe 3268 0e4551b1546fa898c55b2511d9fca86d.exe 3268 0e4551b1546fa898c55b2511d9fca86d.exe 3268 0e4551b1546fa898c55b2511d9fca86d.exe 3268 0e4551b1546fa898c55b2511d9fca86d.exe 3268 0e4551b1546fa898c55b2511d9fca86d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exepid process 3268 0e4551b1546fa898c55b2511d9fca86d.exe -
Suspicious behavior: MapViewOfSection 1 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exepid process 1400 0e4551b1546fa898c55b2511d9fca86d.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.exedescription pid process Token: SeDebugPrivilege 3268 0e4551b1546fa898c55b2511d9fca86d.exe -
Suspicious use of WriteProcessMemory 10 IoCs
Processes:
0e4551b1546fa898c55b2511d9fca86d.execmd.exedescription pid process target process PID 1400 wrote to memory of 3432 1400 0e4551b1546fa898c55b2511d9fca86d.exe cmd.exe PID 1400 wrote to memory of 3432 1400 0e4551b1546fa898c55b2511d9fca86d.exe cmd.exe PID 1400 wrote to memory of 3432 1400 0e4551b1546fa898c55b2511d9fca86d.exe cmd.exe PID 1400 wrote to memory of 3268 1400 0e4551b1546fa898c55b2511d9fca86d.exe 0e4551b1546fa898c55b2511d9fca86d.exe PID 1400 wrote to memory of 3268 1400 0e4551b1546fa898c55b2511d9fca86d.exe 0e4551b1546fa898c55b2511d9fca86d.exe PID 1400 wrote to memory of 3268 1400 0e4551b1546fa898c55b2511d9fca86d.exe 0e4551b1546fa898c55b2511d9fca86d.exe PID 1400 wrote to memory of 3268 1400 0e4551b1546fa898c55b2511d9fca86d.exe 0e4551b1546fa898c55b2511d9fca86d.exe PID 3432 wrote to memory of 3948 3432 cmd.exe schtasks.exe PID 3432 wrote to memory of 3948 3432 cmd.exe schtasks.exe PID 3432 wrote to memory of 3948 3432 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e4551b1546fa898c55b2511d9fca86d.exe"C:\Users\Admin\AppData\Local\Temp\0e4551b1546fa898c55b2511d9fca86d.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN start /XML "C:\Users\Admin\AppData\Local\Temp\16c14909c3e6445da3680b44be5a0ed2.xml"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN start /XML "C:\Users\Admin\AppData\Local\Temp\16c14909c3e6445da3680b44be5a0ed2.xml"3⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\0e4551b1546fa898c55b2511d9fca86d.exe"C:\Users\Admin\AppData\Local\Temp\0e4551b1546fa898c55b2511d9fca86d.exe"2⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\16c14909c3e6445da3680b44be5a0ed2.xmlMD5
43c05bf3455e78df840d6f2bfcfbcb59
SHA1e61b3fb27d8db7a512c054b514928782824c2162
SHA2563e8480932782879bba79ffd9c3067aeb01931308abccb9aa992572708c585ab1
SHA5122a5b739a793d8fd158f8f3783d649ffbbeb8df21576d634f48908983d2b2acbad95c87ebec8ddf764de4bc841a7228eabe840e497b0824c7a7b8c7dca093c4d3
-
memory/3268-3-0x000000000040188B-mapping.dmp
-
memory/3268-7-0x0000000002810000-0x0000000002811000-memory.dmpFilesize
4KB
-
memory/3268-6-0x0000000000400000-0x000000000046D000-memory.dmpFilesize
436KB
-
memory/3268-9-0x0000000002812000-0x0000000002814000-memory.dmpFilesize
8KB
-
memory/3268-8-0x0000000002811000-0x0000000002812000-memory.dmpFilesize
4KB
-
memory/3268-11-0x0000000002818000-0x0000000002819000-memory.dmpFilesize
4KB
-
memory/3268-10-0x0000000002817000-0x0000000002818000-memory.dmpFilesize
4KB
-
memory/3432-2-0x0000000000000000-mapping.dmp
-
memory/3948-4-0x0000000000000000-mapping.dmp