Analysis
-
max time kernel
125s -
max time network
122s -
platform
windows10_x64 -
resource
win10-en-20210920 -
submitted
13-10-2021 15:05
Static task
static1
Behavioral task
behavioral1
Sample
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe
Resource
win7-en-20210920
Behavioral task
behavioral2
Sample
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe
Resource
win10-en-20210920
General
-
Target
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe
-
Size
165KB
-
MD5
a5f245f600e59fce5acfa9d1606a593c
-
SHA1
a411636373d73ac2d0213c7e531c54e92a609cc7
-
SHA256
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0
-
SHA512
ca25db599913f9e5e8300f93fb7a542f72ea4d4f8ff4b921c099a8e63019280122f4f685db7cf2e0362e062514618fc480652040a770b735b3e39b3c6beb84d5
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
dw20.exepid process 1220 dw20.exe 1220 dw20.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
dw20.exedescription pid process Token: SeRestorePrivilege 1220 dw20.exe Token: SeBackupPrivilege 1220 dw20.exe -
Suspicious use of WriteProcessMemory 15 IoCs
Processes:
994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exedescription pid process target process PID 2492 wrote to memory of 3492 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2492 wrote to memory of 3492 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2492 wrote to memory of 3492 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2492 wrote to memory of 660 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2492 wrote to memory of 660 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2492 wrote to memory of 660 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 2492 wrote to memory of 1220 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 2492 wrote to memory of 1220 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 2492 wrote to memory of 1220 2492 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe dw20.exe PID 1420 wrote to memory of 1548 1420 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1420 wrote to memory of 1548 1420 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1420 wrote to memory of 1548 1420 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1420 wrote to memory of 3244 1420 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1420 wrote to memory of 3244 1420 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe PID 1420 wrote to memory of 3244 1420 994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe"C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe"1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v2.0.50727\dw20.exedw20.exe -x -s 8202⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exeC:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe1⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /tn NYAN /F2⤵
-
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn NYAN /tr "C:\Users\Admin\AppData\Local\Temp\994aadc644d5c91b26b7012e5a72863e57f3580773d8a002ec264c3b436d0db0.bin.exe" /sc minute /mo 12⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/660-117-0x0000000000000000-mapping.dmp
-
memory/1220-118-0x0000000000000000-mapping.dmp
-
memory/1420-119-0x0000000000D20000-0x0000000000D21000-memory.dmpFilesize
4KB
-
memory/1548-120-0x0000000000000000-mapping.dmp
-
memory/2492-115-0x0000000003160000-0x0000000003161000-memory.dmpFilesize
4KB
-
memory/3244-121-0x0000000000000000-mapping.dmp
-
memory/3492-116-0x0000000000000000-mapping.dmp