Analysis
-
max time kernel
130s -
max time network
118s -
platform
windows7_x64 -
resource
win7-en-20210920 -
submitted
13-10-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe
Resource
win10-en-20210920
General
-
Target
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe
-
Size
165KB
-
MD5
a5f245f600e59fce5acfa9d1606a593c
-
SHA1
a411636373d73ac2d0213c7e531c54e92a609cc7
-
SHA256
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0
-
SHA512
ca25db599913f9e5e8300f93fb7a542f72ea4d4f8ff4b921c099a8e63019280122f4f685db7cf2e0362e062514618fc480652040a770b735b3e39b3c6beb84d5
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exepid process 524 schtasks.exe 960 schtasks.exe 1148 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
dw20.exepid process 1220 dw20.exe -
Suspicious use of WriteProcessMemory 36 IoCs
Processes:
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exetaskeng.exe994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exedescription pid process target process PID 2004 wrote to memory of 1876 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 1876 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 1876 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 1876 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 524 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 524 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 524 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 524 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2004 wrote to memory of 1220 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 2004 wrote to memory of 1220 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 2004 wrote to memory of 1220 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 2004 wrote to memory of 1220 2004 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 608 wrote to memory of 1072 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 608 wrote to memory of 1072 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 608 wrote to memory of 1072 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 608 wrote to memory of 1072 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 1072 wrote to memory of 828 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 828 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 828 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 828 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 960 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 960 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 960 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1072 wrote to memory of 960 1072 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 608 wrote to memory of 1096 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 608 wrote to memory of 1096 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 608 wrote to memory of 1096 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 608 wrote to memory of 1096 608 taskeng.exe 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe PID 1096 wrote to memory of 288 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 288 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 288 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 288 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 1148 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 1148 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 1148 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1096 wrote to memory of 1148 1096 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe"C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 4442⤵
- Suspicious behavior: GetForegroundWindowSpam
-
C:\Windows\system32\taskeng.exetaskeng.exe {D9F9FA1D-2F7C-4024-B29E-42E1E4423C3F} S-1-5-21-3456797065-1076791440-4146276586-1000:JZCKHXIN\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exeC:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
-
C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exeC:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F3⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe" /sc minute /mo 13⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/288-68-0x0000000000000000-mapping.dmp
-
memory/524-57-0x0000000000000000-mapping.dmp
-
memory/828-63-0x0000000000000000-mapping.dmp
-
memory/960-64-0x0000000000000000-mapping.dmp
-
memory/1072-61-0x0000000000000000-mapping.dmp
-
memory/1072-65-0x0000000001ED0000-0x0000000001ED1000-memory.dmpFilesize
4KB
-
memory/1096-66-0x0000000000000000-mapping.dmp
-
memory/1096-70-0x0000000001E90000-0x0000000001E91000-memory.dmpFilesize
4KB
-
memory/1148-69-0x0000000000000000-mapping.dmp
-
memory/1220-60-0x0000000000560000-0x0000000000561000-memory.dmpFilesize
4KB
-
memory/1220-58-0x0000000000000000-mapping.dmp
-
memory/1876-56-0x0000000000000000-mapping.dmp
-
memory/2004-54-0x0000000076581000-0x0000000076583000-memory.dmpFilesize
8KB
-
memory/2004-55-0x00000000006F0000-0x00000000006F1000-memory.dmpFilesize
4KB