Analysis
-
max time kernel
144s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-en-20220113 -
submitted
12-02-2022 00:47
Static task
static1
Behavioral task
behavioral1
Sample
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
Resource
win7-en-20211208
Behavioral task
behavioral2
Sample
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
Resource
win10v2004-en-20220113
General
-
Target
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe
-
Size
401KB
-
MD5
a9fa01f0aa6c18a5520e918303a91a10
-
SHA1
3f5ef40bfb1181c2944e8fa4ff44215c0831789c
-
SHA256
be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8
-
SHA512
b008c6532ca8e93fc379b21aec4939133dfa1b289f4876a50d3c9f456d0391177ab5f4445cf642dc184eb0bd959e739a6d697950427077be914acbb5cf644ffc
Malware Config
Signatures
-
Drops file in Windows directory 8 IoCs
Processes:
svchost.exeTiWorker.exedescription ioc process File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.jfm svchost.exe File opened for modification C:\Windows\SoftwareDistribution\ReportingEvents.log svchost.exe File opened for modification C:\Windows\Logs\CBS\CBS.log TiWorker.exe File opened for modification C:\Windows\WinSxS\pending.xml TiWorker.exe File opened for modification C:\Windows\WindowsUpdate.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.chk svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\Logs\edb.log svchost.exe File opened for modification C:\Windows\SoftwareDistribution\DataStore\DataStore.edb svchost.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
svchost.exebe336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exeTiWorker.exedescription pid process Token: SeShutdownPrivilege 3368 svchost.exe Token: SeCreatePagefilePrivilege 3368 svchost.exe Token: SeShutdownPrivilege 3368 svchost.exe Token: SeCreatePagefilePrivilege 3368 svchost.exe Token: SeShutdownPrivilege 3368 svchost.exe Token: SeCreatePagefilePrivilege 3368 svchost.exe Token: SeDebugPrivilege 3164 be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe Token: SeBackupPrivilege 1948 TiWorker.exe Token: SeRestorePrivilege 1948 TiWorker.exe Token: SeSecurityPrivilege 1948 TiWorker.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe"C:\Users\Admin\AppData\Local\Temp\be336ff807ecd120dca270ee1fae0b2284d2d112d6f1ed9baa875824146befa8.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s wuauserv1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exeC:\Windows\winsxs\amd64_microsoft-windows-servicingstack_31bf3856ad364e35_10.0.19041.1220_none_7e21bc567c7ed16b\TiWorker.exe -Embedding1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/3164-140-0x0000000004EE2000-0x0000000004EE3000-memory.dmpFilesize
4KB
-
memory/3164-141-0x0000000004EE3000-0x0000000004EE4000-memory.dmpFilesize
4KB
-
memory/3164-146-0x0000000004EE4000-0x0000000004EE6000-memory.dmpFilesize
8KB
-
memory/3164-134-0x0000000000508000-0x0000000000534000-memory.dmpFilesize
176KB
-
memory/3164-145-0x00000000028A0000-0x00000000028DC000-memory.dmpFilesize
240KB
-
memory/3164-136-0x0000000000400000-0x000000000043C000-memory.dmpFilesize
240KB
-
memory/3164-144-0x0000000004D30000-0x0000000004E3A000-memory.dmpFilesize
1.0MB
-
memory/3164-137-0x0000000074FEE000-0x0000000074FEF000-memory.dmpFilesize
4KB
-
memory/3164-135-0x0000000002220000-0x0000000002259000-memory.dmpFilesize
228KB
-
memory/3164-139-0x0000000004EE0000-0x0000000004EE1000-memory.dmpFilesize
4KB
-
memory/3164-138-0x0000000004EF0000-0x0000000005494000-memory.dmpFilesize
5.6MB
-
memory/3164-142-0x00000000054A0000-0x0000000005AB8000-memory.dmpFilesize
6.1MB
-
memory/3164-143-0x0000000002770000-0x0000000002782000-memory.dmpFilesize
72KB
-
memory/3368-131-0x0000020388970000-0x0000020388980000-memory.dmpFilesize
64KB
-
memory/3368-130-0x00000203881A0000-0x00000203881B0000-memory.dmpFilesize
64KB
-
memory/3368-132-0x000002038B580000-0x000002038B584000-memory.dmpFilesize
16KB