Analysis
-
max time kernel
149s -
max time network
50s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-05-2022 20:37
Static task
static1
Behavioral task
behavioral1
Sample
d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe
Resource
win10v2004-20220414-en
General
-
Target
d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe
-
Size
973KB
-
MD5
916541e6803dd6f2339ddac435cc28bc
-
SHA1
088b005106dcf95ccb214902f9bd671bc386ae36
-
SHA256
d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf
-
SHA512
c59dcae9683b9863c5b805ff9ce81070ef572c2108d4209b6ad64d005359e27f328a0f8e3acc26c4d85435e3f30d8e4e7fd2c6a8de8df380e961a87c2a6e377d
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: MapViewOfSection 8 IoCs
Processes:
d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exepid process 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe 428 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.execmd.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exed8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exedescription pid process target process PID 1964 wrote to memory of 1016 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe cmd.exe PID 1964 wrote to memory of 1016 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe cmd.exe PID 1964 wrote to memory of 1016 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe cmd.exe PID 1964 wrote to memory of 1016 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe cmd.exe PID 1016 wrote to memory of 1312 1016 cmd.exe schtasks.exe PID 1016 wrote to memory of 1312 1016 cmd.exe schtasks.exe PID 1016 wrote to memory of 1312 1016 cmd.exe schtasks.exe PID 1016 wrote to memory of 1312 1016 cmd.exe schtasks.exe PID 1964 wrote to memory of 1984 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1964 wrote to memory of 1984 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1964 wrote to memory of 1984 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1964 wrote to memory of 1984 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1964 wrote to memory of 1984 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1964 wrote to memory of 1376 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1964 wrote to memory of 1376 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1964 wrote to memory of 1376 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1964 wrote to memory of 1376 1964 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1376 wrote to memory of 1108 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1376 wrote to memory of 1108 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1376 wrote to memory of 1108 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1376 wrote to memory of 1108 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1376 wrote to memory of 1108 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1376 wrote to memory of 1996 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1376 wrote to memory of 1996 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1376 wrote to memory of 1996 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1376 wrote to memory of 1996 1376 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1996 wrote to memory of 2008 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1996 wrote to memory of 2008 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1996 wrote to memory of 2008 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1996 wrote to memory of 2008 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1996 wrote to memory of 2008 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1996 wrote to memory of 944 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1996 wrote to memory of 944 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1996 wrote to memory of 944 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1996 wrote to memory of 944 1996 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 944 wrote to memory of 1660 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 944 wrote to memory of 1660 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 944 wrote to memory of 1660 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 944 wrote to memory of 1660 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 944 wrote to memory of 1660 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 944 wrote to memory of 868 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 944 wrote to memory of 868 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 944 wrote to memory of 868 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 944 wrote to memory of 868 944 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 868 wrote to memory of 676 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 868 wrote to memory of 676 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 868 wrote to memory of 676 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 868 wrote to memory of 676 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 868 wrote to memory of 676 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 868 wrote to memory of 1864 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 868 wrote to memory of 1864 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 868 wrote to memory of 1864 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 868 wrote to memory of 1864 868 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1864 wrote to memory of 820 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1864 wrote to memory of 820 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1864 wrote to memory of 820 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1864 wrote to memory of 820 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1864 wrote to memory of 820 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 1864 wrote to memory of 428 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1864 wrote to memory of 428 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1864 wrote to memory of 428 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 1864 wrote to memory of 428 1864 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe PID 428 wrote to memory of 680 428 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe PID 428 wrote to memory of 680 428 d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe MSBuild.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"1⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Windows\SysWOW64\cmd.execmd /c schtasks /Create /TN hghyh /XML "C:\Users\Admin\AppData\Local\Temp\b118352451ca445c83c32e8ee5d2d5c5.xml"2⤵
- Suspicious use of WriteProcessMemory
PID:1016 -
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN hghyh /XML "C:\Users\Admin\AppData\Local\Temp\b118352451ca445c83c32e8ee5d2d5c5.xml"3⤵
- Creates scheduled task(s)
PID:1312 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"2⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"2⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1376 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"3⤵PID:1108
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"3⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"4⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"4⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:944 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"5⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"5⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:868 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"6⤵PID:676
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"6⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"7⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"7⤵
- Suspicious behavior: MapViewOfSection
- Suspicious use of WriteProcessMemory
PID:428 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe"8⤵PID:680
-
C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"C:\Users\Admin\AppData\Local\Temp\d8bbf2d84a533532848b4895833af517da967466375738988cf5b4c40f7213cf.exe"8⤵PID:1976
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD550c7d96141cdd50386ae866b74565f0f
SHA18cbadc1644145bf381f632d52acd1f1c0a5aceb6
SHA25656333f9ef9b66dbbc99f52ad5a04d7e1c3fad175f97a08628b5f4983b46e864d
SHA5120a42b3a240effb667ddccd8d2be0df4ff5c184108c10671b1b482b92ab9c2b51d5bf9930ba68fc74c0ab729846a4e83f5c5f6ef41c5fd0ca270e3d57e447aea7