Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
03-07-2022 17:11
Static task
static1
Behavioral task
behavioral1
Sample
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe
Resource
win7-20220414-en
General
-
Target
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe
-
Size
523KB
-
MD5
4cd23351cc6d22101b35a277f153254d
-
SHA1
fde0ef944468ed7ac67301afbd3a817bab2d0c68
-
SHA256
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876
-
SHA512
fb086e2d6e50af53141f303a9b413e19994ae552750481f466b897bf8962d749600045ee31d95a03d2cd7b59b7f05780a9a1b580b94f45de51355f8bab09e0c8
Malware Config
Signatures
-
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription pid process target process PID 3124 set thread context of 760 3124 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription pid process Token: SeDebugPrivilege 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exepid process 3124 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exedescription pid process target process PID 3124 wrote to memory of 760 3124 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 3124 wrote to memory of 760 3124 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 3124 wrote to memory of 760 3124 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe PID 760 wrote to memory of 4268 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe PID 760 wrote to memory of 4268 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe PID 760 wrote to memory of 4268 760 3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe"C:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exeC:\Users\Admin\AppData\Local\Temp\3b3be23bcf96a7ae69c16d1e493b58c600afc17469dfe37ee0986230e458a876.exe"2⤵
- Checks whether UAC is enabled
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WPA Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmpDF39.tmp"3⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDF39.tmpFilesize
1KB
MD59b9580c00f60483c61ba0ede69835bc3
SHA1b7c4b306e0931d0d13484961b144abd117b6a5fb
SHA2566afc44ae68d94065cacdf669fb074d20e788a2a37c1b081b57947487a3ee93d0
SHA512f794cce472c7ee563957aaa7d508f1a38a8889e7f19e2673840bce7479bbe5f01c08b27bbbc0563eedefa36ab4dcda3cdea9240da63d8886aa6cc294438be1ae
-
memory/760-133-0x0000000000000000-mapping.dmp
-
memory/760-135-0x0000000000400000-0x0000000000451000-memory.dmpFilesize
324KB
-
memory/760-137-0x0000000077BE0000-0x0000000077D83000-memory.dmpFilesize
1.6MB
-
memory/760-138-0x0000000077BE0000-0x0000000077D83000-memory.dmpFilesize
1.6MB
-
memory/760-139-0x0000000075250000-0x0000000075801000-memory.dmpFilesize
5.7MB
-
memory/760-142-0x0000000077BE0000-0x0000000077D83000-memory.dmpFilesize
1.6MB
-
memory/760-143-0x0000000075250000-0x0000000075801000-memory.dmpFilesize
5.7MB
-
memory/3124-132-0x0000000002BC0000-0x0000000002BC7000-memory.dmpFilesize
28KB
-
memory/3124-134-0x0000000077BE0000-0x0000000077D83000-memory.dmpFilesize
1.6MB
-
memory/4268-140-0x0000000000000000-mapping.dmp