Analysis

  • max time kernel
    135s
  • max time network
    172s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    24-05-2021 19:31

General

  • Target

    boost-fps.exe

  • Size

    1.3MB

  • MD5

    92fc1129af30ba08a79113624f51bcb7

  • SHA1

    b68388c46a78d262fcdedbaea09372785fb6786c

  • SHA256

    121dec5bd279daf16e683e472949a269bb9751d6ceae4274875e36abe8871946

  • SHA512

    3c1b7f326e717e0ed6cc435647598ec37ce0c2b90a942317f8d4b2c2ac8d3bd4f6c94ec86ad5af4ded8bf31a25485590b03549e0cd5e3509308e04e066efc12c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 9 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Drops file in Program Files directory 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\boost-fps.exe
    "C:\Users\Admin\AppData\Local\Temp\boost-fps.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:368
    • C:\Users\Admin\AppData\Local\Temp\boost-fps.exe
      "{path}"
      2⤵
      • Loads dropped DLL
      • Drops file in System32 directory
      • Drops file in Program Files directory
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1560
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\System32\hnetmon\lsm.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1832
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "boost-fps" /sc ONLOGON /tr "'C:\MSOCache\All Users\{90140000-0018-0409-0000-0000000FF1CE}-C\boost-fps.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2044
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\System32\VBICodec\wininit.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1168
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\System32\UIRibbonRes\spoolsv.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1692
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\mobsync\csrss.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1972
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "services" /sc ONLOGON /tr "'C:\Program Files (x86)\Common Files\Adobe\Updater6\services.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1876
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "lsm" /sc ONLOGON /tr "'C:\ProgramData\Desktop\lsm.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:920
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "explorer" /sc ONLOGON /tr "'C:\Windows\setupact\explorer.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2036
      • C:\Windows\SysWOW64\schtasks.exe
        "schtasks" /create /tn "Idle" /sc ONLOGON /tr "'C:\Program Files\Windows Photo Viewer\en-US\Idle.exe'" /rl HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1688
      • C:\Program Files\Windows Photo Viewer\en-US\Idle.exe
        "C:\Program Files\Windows Photo Viewer\en-US\Idle.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetThreadContext
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Program Files\Windows Photo Viewer\en-US\Idle.exe
          "{path}"
          4⤵
          • Executes dropped EXE
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1636
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1164
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x594
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1084

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Program Files\Windows Photo Viewer\en-US\Idle.exe
      MD5

      92fc1129af30ba08a79113624f51bcb7

      SHA1

      b68388c46a78d262fcdedbaea09372785fb6786c

      SHA256

      121dec5bd279daf16e683e472949a269bb9751d6ceae4274875e36abe8871946

      SHA512

      3c1b7f326e717e0ed6cc435647598ec37ce0c2b90a942317f8d4b2c2ac8d3bd4f6c94ec86ad5af4ded8bf31a25485590b03549e0cd5e3509308e04e066efc12c

    • C:\Program Files\Windows Photo Viewer\en-US\Idle.exe
      MD5

      92fc1129af30ba08a79113624f51bcb7

      SHA1

      b68388c46a78d262fcdedbaea09372785fb6786c

      SHA256

      121dec5bd279daf16e683e472949a269bb9751d6ceae4274875e36abe8871946

      SHA512

      3c1b7f326e717e0ed6cc435647598ec37ce0c2b90a942317f8d4b2c2ac8d3bd4f6c94ec86ad5af4ded8bf31a25485590b03549e0cd5e3509308e04e066efc12c

    • C:\Program Files\Windows Photo Viewer\en-US\Idle.exe
      MD5

      92fc1129af30ba08a79113624f51bcb7

      SHA1

      b68388c46a78d262fcdedbaea09372785fb6786c

      SHA256

      121dec5bd279daf16e683e472949a269bb9751d6ceae4274875e36abe8871946

      SHA512

      3c1b7f326e717e0ed6cc435647598ec37ce0c2b90a942317f8d4b2c2ac8d3bd4f6c94ec86ad5af4ded8bf31a25485590b03549e0cd5e3509308e04e066efc12c

    • \Program Files\Windows Photo Viewer\en-US\Idle.exe
      MD5

      92fc1129af30ba08a79113624f51bcb7

      SHA1

      b68388c46a78d262fcdedbaea09372785fb6786c

      SHA256

      121dec5bd279daf16e683e472949a269bb9751d6ceae4274875e36abe8871946

      SHA512

      3c1b7f326e717e0ed6cc435647598ec37ce0c2b90a942317f8d4b2c2ac8d3bd4f6c94ec86ad5af4ded8bf31a25485590b03549e0cd5e3509308e04e066efc12c

    • memory/368-61-0x00000000012C0000-0x00000000012C1000-memory.dmp
      Filesize

      4KB

    • memory/368-62-0x0000000000440000-0x0000000000445000-memory.dmp
      Filesize

      20KB

    • memory/368-63-0x0000000008030000-0x00000000080CC000-memory.dmp
      Filesize

      624KB

    • memory/368-64-0x0000000007EB0000-0x0000000007F26000-memory.dmp
      Filesize

      472KB

    • memory/368-59-0x0000000001310000-0x0000000001311000-memory.dmp
      Filesize

      4KB

    • memory/920-76-0x0000000000000000-mapping.dmp
    • memory/1164-95-0x000007FEFBB31000-0x000007FEFBB33000-memory.dmp
      Filesize

      8KB

    • memory/1168-72-0x0000000000000000-mapping.dmp
    • memory/1560-67-0x0000000000400000-0x000000000046A000-memory.dmp
      Filesize

      424KB

    • memory/1560-69-0x0000000001270000-0x0000000001271000-memory.dmp
      Filesize

      4KB

    • memory/1560-65-0x0000000000400000-0x000000000046A000-memory.dmp
      Filesize

      424KB

    • memory/1560-66-0x0000000000465BEE-mapping.dmp
    • memory/1636-94-0x0000000004ED0000-0x0000000004ED1000-memory.dmp
      Filesize

      4KB

    • memory/1636-90-0x0000000000465BEE-mapping.dmp
    • memory/1688-78-0x0000000000000000-mapping.dmp
    • memory/1692-73-0x0000000000000000-mapping.dmp
    • memory/1832-70-0x0000000000000000-mapping.dmp
    • memory/1836-83-0x0000000001180000-0x0000000001181000-memory.dmp
      Filesize

      4KB

    • memory/1836-86-0x0000000004FB0000-0x0000000004FB1000-memory.dmp
      Filesize

      4KB

    • memory/1836-80-0x0000000000000000-mapping.dmp
    • memory/1876-75-0x0000000000000000-mapping.dmp
    • memory/1972-74-0x0000000000000000-mapping.dmp
    • memory/2036-77-0x0000000000000000-mapping.dmp
    • memory/2044-71-0x0000000000000000-mapping.dmp