Analysis
-
max time kernel
132s -
max time network
147s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
03-07-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe
Resource
win7-20220414-en
General
-
Target
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe
-
Size
523KB
-
MD5
4cd23351cc6d22101b35a277f153254d
-
SHA1
fde0ef944468ed7ac67301afbd3a817bab2d0c68
-
SHA256
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876
-
SHA512
fb086e2d6e50af53141f303a9b413e19994ae552750481f466b897bf8962d749600045ee31d95a03d2cd7b59b7f05780a9a1b580b94f45de51355f8bab09e0c8
Malware Config
Signatures
-
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription pid process target process PID 1980 set thread context of 1540 1980 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription pid process Token: SeDebugPrivilege 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 1980 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of UnmapMainImage 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of WriteProcessMemory 8 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription pid process target process PID 1980 wrote to memory of 1540 1980 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 1980 wrote to memory of 1540 1980 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 1980 wrote to memory of 1540 1980 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 1980 wrote to memory of 1540 1980 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 1540 wrote to memory of 852 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe PID 1540 wrote to memory of 852 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe PID 1540 wrote to memory of 852 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe PID 1540 wrote to memory of 852 1540 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe"C:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exeC:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of UnmapMainImage
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DSL Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp4E7F.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp4E7F.tmpFilesize
1KB
MD59b9580c00f60483c61ba0ede69835bc3
SHA1b7c4b306e0931d0d13484961b144abd117b6a5fb
SHA2566afc44ae68d94065cacdf669fb074d20e788a2a37c1b081b57947487a3ee93d0
SHA512f794cce472c7ee563957aaa7d508f1a38a8889e7f19e2673840bce7479bbe5f01c08b27bbbc0563eedefa36ab4dcda3cdea9240da63d8886aa6cc294438be1ae
-
memory/852-63-0x0000000000000000-mapping.dmp
-
memory/1540-58-0x0000000000471561-mapping.dmp
-
memory/1540-61-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/1540-65-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/1540-66-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB
-
memory/1540-67-0x0000000074970000-0x0000000074F1B000-memory.dmpFilesize
5.7MB
-
memory/1540-68-0x0000000074970000-0x0000000074F1B000-memory.dmpFilesize
5.7MB
-
memory/1980-56-0x0000000000340000-0x0000000000347000-memory.dmpFilesize
28KB
-
memory/1980-57-0x00000000768D1000-0x00000000768D3000-memory.dmpFilesize
8KB
-
memory/1980-59-0x0000000077920000-0x0000000077AA0000-memory.dmpFilesize
1.5MB