Analysis
-
max time kernel
117s -
max time network
150s -
platform
windows7_x64 -
resource
win7-en-20211208 -
submitted
25-01-2022 20:58
Static task
static1
Behavioral task
behavioral1
Sample
b5320340037751e10748b6463fab8ee0.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
b5320340037751e10748b6463fab8ee0.exe
Resource
win10-en-20211208
General
-
Target
b5320340037751e10748b6463fab8ee0.exe
-
Size
2.1MB
-
MD5
b5320340037751e10748b6463fab8ee0
-
SHA1
b3e9a125688e9da67708adfcada41bb56de2cd3d
-
SHA256
b45b4ee4146fc230dc6ea93a1af252314acc9b4adab82f36103e8f782589983d
-
SHA512
67e3bdc6c8db9ed127dc0a7a0fcb431a7294fd8daf77fe6ce4042a3cb63b9576130f1d3b3aee665dc16c1de4ede96ed7976789e63a4d61178c631d3d76e06138
Malware Config
Signatures
-
Process spawned unexpected child process 5 IoCs
This typically indicates the parent process was compromised via an exploit or macro.
description pid pid_target Process procid_target Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1528 1856 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 612 1856 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1640 1856 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1716 1856 schtasks.exe 27 Parent C:\Windows\system32\wbem\wmiprvse.exe is not expected to spawn this process 1396 1856 schtasks.exe 27 -
Executes dropped EXE 1 IoCs
pid Process 848 winlogon.exe -
Adds Run key to start application 2 TTPs 5 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Users\\Public\\Favorites\\csrss.exe\"" b5320340037751e10748b6463fab8ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\winlogon = "\"C:\\Windows\\System32\\msvcr110\\winlogon.exe\"" b5320340037751e10748b6463fab8ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\csrss = "\"C:\\Windows\\System32\\NlsData002a\\csrss.exe\"" b5320340037751e10748b6463fab8ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\spoolsv = "\"C:\\Windows\\IME\\spoolsv.exe\"" b5320340037751e10748b6463fab8ee0.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\smss = "\"C:\\Windows\\System32\\SCardSvr\\smss.exe\"" b5320340037751e10748b6463fab8ee0.exe -
Drops file in System32 directory 7 IoCs
description ioc Process File created C:\Windows\System32\msvcr110\winlogon.exe b5320340037751e10748b6463fab8ee0.exe File opened for modification C:\Windows\System32\msvcr110\winlogon.exe b5320340037751e10748b6463fab8ee0.exe File created C:\Windows\System32\msvcr110\cc11b995f2a76d b5320340037751e10748b6463fab8ee0.exe File created C:\Windows\System32\NlsData002a\csrss.exe b5320340037751e10748b6463fab8ee0.exe File created C:\Windows\System32\NlsData002a\886983d96e3d3e b5320340037751e10748b6463fab8ee0.exe File created C:\Windows\System32\SCardSvr\smss.exe b5320340037751e10748b6463fab8ee0.exe File created C:\Windows\System32\SCardSvr\69ddcba757bf72 b5320340037751e10748b6463fab8ee0.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File created C:\Windows\IME\spoolsv.exe b5320340037751e10748b6463fab8ee0.exe File created C:\Windows\IME\f3b6ecef712a24 b5320340037751e10748b6463fab8ee0.exe -
Creates scheduled task(s) 1 TTPs 5 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1528 schtasks.exe 612 schtasks.exe 1640 schtasks.exe 1716 schtasks.exe 1396 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 15 IoCs
pid Process 740 b5320340037751e10748b6463fab8ee0.exe 1036 powershell.exe 1316 powershell.exe 1412 powershell.exe 1660 powershell.exe 1512 powershell.exe 1868 powershell.exe 848 winlogon.exe 848 winlogon.exe 848 winlogon.exe 848 winlogon.exe 848 winlogon.exe 848 winlogon.exe 848 winlogon.exe 848 winlogon.exe -
Suspicious use of AdjustPrivilegeToken 8 IoCs
description pid Process Token: SeDebugPrivilege 740 b5320340037751e10748b6463fab8ee0.exe Token: SeDebugPrivilege 848 winlogon.exe Token: SeDebugPrivilege 1036 powershell.exe Token: SeDebugPrivilege 1316 powershell.exe Token: SeDebugPrivilege 1412 powershell.exe Token: SeDebugPrivilege 1660 powershell.exe Token: SeDebugPrivilege 1512 powershell.exe Token: SeDebugPrivilege 1868 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 740 wrote to memory of 1512 740 b5320340037751e10748b6463fab8ee0.exe 33 PID 740 wrote to memory of 1512 740 b5320340037751e10748b6463fab8ee0.exe 33 PID 740 wrote to memory of 1512 740 b5320340037751e10748b6463fab8ee0.exe 33 PID 740 wrote to memory of 1316 740 b5320340037751e10748b6463fab8ee0.exe 44 PID 740 wrote to memory of 1316 740 b5320340037751e10748b6463fab8ee0.exe 44 PID 740 wrote to memory of 1316 740 b5320340037751e10748b6463fab8ee0.exe 44 PID 740 wrote to memory of 1660 740 b5320340037751e10748b6463fab8ee0.exe 34 PID 740 wrote to memory of 1660 740 b5320340037751e10748b6463fab8ee0.exe 34 PID 740 wrote to memory of 1660 740 b5320340037751e10748b6463fab8ee0.exe 34 PID 740 wrote to memory of 1412 740 b5320340037751e10748b6463fab8ee0.exe 42 PID 740 wrote to memory of 1412 740 b5320340037751e10748b6463fab8ee0.exe 42 PID 740 wrote to memory of 1412 740 b5320340037751e10748b6463fab8ee0.exe 42 PID 740 wrote to memory of 1868 740 b5320340037751e10748b6463fab8ee0.exe 40 PID 740 wrote to memory of 1868 740 b5320340037751e10748b6463fab8ee0.exe 40 PID 740 wrote to memory of 1868 740 b5320340037751e10748b6463fab8ee0.exe 40 PID 740 wrote to memory of 1036 740 b5320340037751e10748b6463fab8ee0.exe 39 PID 740 wrote to memory of 1036 740 b5320340037751e10748b6463fab8ee0.exe 39 PID 740 wrote to memory of 1036 740 b5320340037751e10748b6463fab8ee0.exe 39 PID 740 wrote to memory of 848 740 b5320340037751e10748b6463fab8ee0.exe 45 PID 740 wrote to memory of 848 740 b5320340037751e10748b6463fab8ee0.exe 45 PID 740 wrote to memory of 848 740 b5320340037751e10748b6463fab8ee0.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b5320340037751e10748b6463fab8ee0.exe"C:\Users\Admin\AppData\Local\Temp\b5320340037751e10748b6463fab8ee0.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Drops file in Windows directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:740 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp\b5320340037751e10748b6463fab8ee0.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1512
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\NlsData002a\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1660
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Favorites\csrss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1036
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\SCardSvr\smss.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1868
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\IME\spoolsv.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1412
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\System32\msvcr110\winlogon.exe'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1316
-
-
C:\Windows\System32\msvcr110\winlogon.exe"C:\Windows\System32\msvcr110\winlogon.exe"2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:848
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "winlogon" /sc ONLOGON /tr "'C:\Windows\System32\msvcr110\winlogon.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1528
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Windows\System32\NlsData002a\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:612
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "spoolsv" /sc ONLOGON /tr "'C:\Windows\IME\spoolsv.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1640
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "smss" /sc ONLOGON /tr "'C:\Windows\System32\SCardSvr\smss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1716
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /tn "csrss" /sc ONLOGON /tr "'C:\Users\Public\Favorites\csrss.exe'" /rl HIGHEST /f1⤵
- Process spawned unexpected child process
- Creates scheduled task(s)
PID:1396