Analysis
-
max time kernel
139s -
max time network
44s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
20-04-2022 02:57
Static task
static1
Behavioral task
behavioral1
Sample
f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe
Resource
win10v2004-20220414-en
General
-
Target
f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe
-
Size
595KB
-
MD5
e6bab12c7456216175a7ed7598d39b02
-
SHA1
525990e346d2708da8ef38dd0254e49f2c3330b6
-
SHA256
f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8
-
SHA512
b90c9d3e55b48d42e165bbe9d12217d2d4c31bcce5ec2590fd2bfb26e068d5dd8d8515eaa6b5e5b98f26e2066142c2a432bbea7ad1f955dfc9a916e3da98dcad
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: MapViewOfSection 10 IoCs
Processes:
f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exepid process 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 520 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 428 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 2040 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 2040 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe 1160 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.execmd.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exef158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exedescription pid process target process PID 1936 wrote to memory of 1484 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1484 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1484 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1484 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1560 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1560 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1560 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1936 wrote to memory of 1560 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1560 wrote to memory of 832 1560 cmd.exe schtasks.exe PID 1560 wrote to memory of 832 1560 cmd.exe schtasks.exe PID 1560 wrote to memory of 832 1560 cmd.exe schtasks.exe PID 1560 wrote to memory of 832 1560 cmd.exe schtasks.exe PID 1936 wrote to memory of 1740 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1936 wrote to memory of 1740 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1936 wrote to memory of 1740 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1936 wrote to memory of 1740 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1936 wrote to memory of 1740 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1936 wrote to memory of 1752 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1936 wrote to memory of 1752 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1936 wrote to memory of 1752 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1936 wrote to memory of 1752 1936 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1752 wrote to memory of 1128 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1752 wrote to memory of 1128 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1752 wrote to memory of 1128 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1752 wrote to memory of 1128 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1752 wrote to memory of 1100 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1752 wrote to memory of 1100 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1752 wrote to memory of 1100 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1752 wrote to memory of 1100 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1752 wrote to memory of 1100 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1752 wrote to memory of 920 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1752 wrote to memory of 920 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1752 wrote to memory of 920 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1752 wrote to memory of 920 1752 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 920 wrote to memory of 1996 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 920 wrote to memory of 1996 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 920 wrote to memory of 1996 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 920 wrote to memory of 1996 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 920 wrote to memory of 580 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 920 wrote to memory of 580 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 920 wrote to memory of 580 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 920 wrote to memory of 580 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 920 wrote to memory of 580 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 920 wrote to memory of 1376 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 920 wrote to memory of 1376 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 920 wrote to memory of 1376 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 920 wrote to memory of 1376 920 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1376 wrote to memory of 784 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1376 wrote to memory of 784 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1376 wrote to memory of 784 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1376 wrote to memory of 784 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 1376 wrote to memory of 1120 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1376 wrote to memory of 1120 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1376 wrote to memory of 1120 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1376 wrote to memory of 1120 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1376 wrote to memory of 1120 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe MSBuild.exe PID 1376 wrote to memory of 520 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1376 wrote to memory of 520 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1376 wrote to memory of 520 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 1376 wrote to memory of 520 1376 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe PID 520 wrote to memory of 1492 520 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 520 wrote to memory of 1492 520 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 520 wrote to memory of 1492 520 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe PID 520 wrote to memory of 1492 520 f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1936 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls2⤵PID:1484
-
C:\Windows\SysWOW64\cmd.execmd /c schtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\039462f71f604c9aaf15be88cc879815.xml"2⤵
- Suspicious use of WriteProcessMemory
PID:1560 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN name /XML "C:\Users\Admin\AppData\Local\Temp\039462f71f604c9aaf15be88cc879815.xml"3⤵
- Creates scheduled task(s)
PID:832 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1740
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1752 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls3⤵PID:1128
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1100
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:920 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls4⤵PID:1996
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:580
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls5⤵PID:784
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:1120
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"5⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:520 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls6⤵PID:1492
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"6⤵
- Suspicious behavior: MapViewOfSection
PID:428 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls7⤵PID:1596
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"7⤵
- Suspicious behavior: MapViewOfSection
PID:2040 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls8⤵PID:1476
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"8⤵
- Suspicious behavior: MapViewOfSection
PID:1160 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls9⤵PID:1920
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"9⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"C:\Users\Admin\AppData\Local\Temp\f158a1e36c936286a10c2a463439b7d8b16271ca16838cc92ff2219541ecc8e8.exe"9⤵PID:1992
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c cls10⤵PID:604
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ffb76264697abd63336aaca3b388a942
SHA19488da856e01c993fe9f85daa45292f71d5c1dd4
SHA25645cc5439202830bfa6d966bb907714a9da40bc259470ffb5da8842f39083e54a
SHA51203d394f92d5cf18071151c793088f2b495381fe93d152ad19b5eee3c8507bd1257751dc58fa889ab8035aa5bfe5b85f8b6f2ef02813b6d0b1d2553f12ffca582