Analysis
-
max time kernel
16s -
max time network
153s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
18-01-2021 09:46
Static task
static1
Behavioral task
behavioral1
Sample
f2651b458654fc1799efe0c9ab71fdbf.exe
Resource
win7v20201028
General
-
Target
f2651b458654fc1799efe0c9ab71fdbf.exe
-
Size
956KB
-
MD5
f2651b458654fc1799efe0c9ab71fdbf
-
SHA1
acb40c16a5163ccaa66a5a86084005d696fd590a
-
SHA256
3513df7406eef953434f0c75bcdf33c112ee42d6f81edb1928d1e008b691d703
-
SHA512
19e1a21a15391eb6d77248d3bb4d0bc8ce3685b718a674eea627166b59e9edc3be69cc99eae1885c054a5f52eaa3a130383cd3757247b08b544eb97677ce55f2
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
f2651b458654fc1799efe0c9ab71fdbf.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Service = "C:\\Program Files (x86)\\WAN Service\\wansv.exe" f2651b458654fc1799efe0c9ab71fdbf.exe -
Processes:
f2651b458654fc1799efe0c9ab71fdbf.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA f2651b458654fc1799efe0c9ab71fdbf.exe -
Drops file in Program Files directory 2 IoCs
Processes:
f2651b458654fc1799efe0c9ab71fdbf.exedescription ioc process File created C:\Program Files (x86)\WAN Service\wansv.exe f2651b458654fc1799efe0c9ab71fdbf.exe File opened for modification C:\Program Files (x86)\WAN Service\wansv.exe f2651b458654fc1799efe0c9ab71fdbf.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
f2651b458654fc1799efe0c9ab71fdbf.exepid process 3888 f2651b458654fc1799efe0c9ab71fdbf.exe 3888 f2651b458654fc1799efe0c9ab71fdbf.exe 3888 f2651b458654fc1799efe0c9ab71fdbf.exe 3888 f2651b458654fc1799efe0c9ab71fdbf.exe 3888 f2651b458654fc1799efe0c9ab71fdbf.exe 3888 f2651b458654fc1799efe0c9ab71fdbf.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
f2651b458654fc1799efe0c9ab71fdbf.exepid process 3888 f2651b458654fc1799efe0c9ab71fdbf.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
f2651b458654fc1799efe0c9ab71fdbf.exedescription pid process Token: SeDebugPrivilege 3888 f2651b458654fc1799efe0c9ab71fdbf.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
f2651b458654fc1799efe0c9ab71fdbf.execmd.exedescription pid process target process PID 3888 wrote to memory of 2532 3888 f2651b458654fc1799efe0c9ab71fdbf.exe cmd.exe PID 3888 wrote to memory of 2532 3888 f2651b458654fc1799efe0c9ab71fdbf.exe cmd.exe PID 3888 wrote to memory of 2532 3888 f2651b458654fc1799efe0c9ab71fdbf.exe cmd.exe PID 2532 wrote to memory of 2032 2532 cmd.exe schtasks.exe PID 2532 wrote to memory of 2032 2532 cmd.exe schtasks.exe PID 2532 wrote to memory of 2032 2532 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f2651b458654fc1799efe0c9ab71fdbf.exe"C:\Users\Admin\AppData\Local\Temp\f2651b458654fc1799efe0c9ab71fdbf.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /Create /TN start /XML "C:\Users\Admin\AppData\Local\Temp\75485bf249a64428a958453421129ae0.xml"2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN start /XML "C:\Users\Admin\AppData\Local\Temp\75485bf249a64428a958453421129ae0.xml"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\75485bf249a64428a958453421129ae0.xmlMD5
9b9f55269777478c14d0df70aca1e605
SHA170cb6623e23bb5ea8a4b2c955196c8220fafea0c
SHA2566608a0d42fa40e15f4efbfe0ed68ecc41446c46b650f2dbcd55b36d1ef20da48
SHA512a1c7756f26ed442c7fe88745a5654d0318f77d0af75a2e64d8411118fa3d3e8fca08015b631aeda9223363738fbe8e48a4bc3770e16023cd19733c4dff90343b
-
memory/2032-3-0x0000000000000000-mapping.dmp
-
memory/2532-2-0x0000000000000000-mapping.dmp
-
memory/3888-6-0x000000001D2A0000-0x000000001D2A1000-memory.dmpFilesize
4KB
-
memory/3888-7-0x000000001D2A1000-0x000000001D2A2000-memory.dmpFilesize
4KB
-
memory/3888-5-0x0000000000400000-0x000000000046E000-memory.dmpFilesize
440KB
-
memory/3888-8-0x000000001D2A2000-0x000000001D2A4000-memory.dmpFilesize
8KB
-
memory/3888-9-0x000000001D2A7000-0x000000001D2A8000-memory.dmpFilesize
4KB
-
memory/3888-10-0x000000001D2A8000-0x000000001D2A9000-memory.dmpFilesize
4KB