Analysis

  • max time kernel
    149s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    02-12-2021 16:06

General

  • Target

    fa35e20372326e5c1e12607df198b5c4.exe

  • Size

    1.4MB

  • MD5

    fa35e20372326e5c1e12607df198b5c4

  • SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

  • SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

  • SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 4 IoCs
  • Obfuscated with Agile.Net obfuscator 1 IoCs

    Detects use of the Agile.Net commercial obfuscator, which is capable of entity renaming and control flow obfuscation.

  • Suspicious use of SetThreadContext 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe
    "C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:872
    • C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe
      "C:\Users\Admin\AppData\Local\Temp\fa35e20372326e5c1e12607df198b5c4.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:924
      • C:\Windows\SysWOW64\schtasks.exe
        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1828
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {B72C564D-A515-4C9E-9CDE-764D5B76234C} S-1-5-21-103686315-404690609-2047157615-1000:EDWYFHKN\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1544
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1524
      • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:1760
        • C:\Windows\SysWOW64\schtasks.exe
          /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe"
          4⤵
          • Creates scheduled task(s)
          PID:1416
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1116
    • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1844

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    MD5

    fa35e20372326e5c1e12607df198b5c4

    SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

    SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

    SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    MD5

    fa35e20372326e5c1e12607df198b5c4

    SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

    SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

    SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    MD5

    fa35e20372326e5c1e12607df198b5c4

    SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

    SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

    SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    MD5

    fa35e20372326e5c1e12607df198b5c4

    SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

    SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

    SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

  • C:\Users\Admin\AppData\Roaming\Microsoft\TelemetryServices\fodhelper.exe
    MD5

    fa35e20372326e5c1e12607df198b5c4

    SHA1

    a022779cbf0fca54ef969c8a86be95083f9e128d

    SHA256

    697e0cf2e6636fff9b8cbece1e67cc5db6b0eb58aace6bafd7656874a9462f49

    SHA512

    c24b55c429d6d77791ad3fca53685f9f2f72b336cdf4de62f95e10fb54c1f3e55cda511b78415bbba474131ce4fd9bc887d1086b30a557fb08207487541dd25e

  • memory/872-55-0x0000000001130000-0x0000000001131000-memory.dmp
    Filesize

    4KB

  • memory/872-57-0x0000000000610000-0x0000000000611000-memory.dmp
    Filesize

    4KB

  • memory/872-58-0x0000000000290000-0x00000000002B1000-memory.dmp
    Filesize

    132KB

  • memory/872-59-0x0000000000611000-0x0000000000612000-memory.dmp
    Filesize

    4KB

  • memory/872-60-0x00000000004C0000-0x00000000004CB000-memory.dmp
    Filesize

    44KB

  • memory/872-61-0x0000000000600000-0x0000000000601000-memory.dmp
    Filesize

    4KB

  • memory/924-70-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/924-62-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/924-67-0x000000000040202B-mapping.dmp
  • memory/924-66-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/924-68-0x00000000760C1000-0x00000000760C3000-memory.dmp
    Filesize

    8KB

  • memory/924-65-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/924-63-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/924-64-0x0000000000400000-0x0000000000406000-memory.dmp
    Filesize

    24KB

  • memory/1116-94-0x0000000004DC0000-0x0000000004DC1000-memory.dmp
    Filesize

    4KB

  • memory/1116-92-0x0000000000E80000-0x0000000000E81000-memory.dmp
    Filesize

    4KB

  • memory/1116-90-0x0000000000000000-mapping.dmp
  • memory/1416-89-0x0000000000000000-mapping.dmp
  • memory/1524-72-0x0000000000000000-mapping.dmp
  • memory/1524-78-0x0000000004F11000-0x0000000004F12000-memory.dmp
    Filesize

    4KB

  • memory/1524-76-0x0000000004F10000-0x0000000004F11000-memory.dmp
    Filesize

    4KB

  • memory/1524-74-0x0000000000E80000-0x0000000000E81000-memory.dmp
    Filesize

    4KB

  • memory/1760-86-0x000000000040202B-mapping.dmp
  • memory/1828-69-0x0000000000000000-mapping.dmp
  • memory/1844-96-0x0000000000000000-mapping.dmp
  • memory/1844-100-0x0000000000DF0000-0x0000000000DF1000-memory.dmp
    Filesize

    4KB