Analysis
-
max time kernel
152s -
max time network
172s -
platform
windows7_x64 -
resource
win7-20220414-en -
submitted
12-07-2022 14:58
Static task
static1
Behavioral task
behavioral1
Sample
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
Resource
win10v2004-20220414-en
General
-
Target
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
-
Size
1.2MB
-
MD5
597f6110fa73a2bad89341afed59cd97
-
SHA1
f17fe429934d5f23219aa3fda89e078efbd9daf1
-
SHA256
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
-
SHA512
606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 880 mmcbase.exe 1504 mmcbase.exe 468 mmcbase.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral1/files/0x000700000001316f-56.dat autoit_exe behavioral1/files/0x000700000001316f-59.dat autoit_exe behavioral1/files/0x000700000001316f-62.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ mmcbase.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ mmcbase.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ mmcbase.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\WinMgmts:\ 49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe 1504 mmcbase.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1684 49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2040 wrote to memory of 880 2040 taskeng.exe 30 PID 2040 wrote to memory of 880 2040 taskeng.exe 30 PID 2040 wrote to memory of 880 2040 taskeng.exe 30 PID 2040 wrote to memory of 880 2040 taskeng.exe 30 PID 2040 wrote to memory of 1504 2040 taskeng.exe 33 PID 2040 wrote to memory of 1504 2040 taskeng.exe 33 PID 2040 wrote to memory of 1504 2040 taskeng.exe 33 PID 2040 wrote to memory of 1504 2040 taskeng.exe 33 PID 2040 wrote to memory of 468 2040 taskeng.exe 34 PID 2040 wrote to memory of 468 2040 taskeng.exe 34 PID 2040 wrote to memory of 468 2040 taskeng.exe 34 PID 2040 wrote to memory of 468 2040 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe"C:\Users\Admin\AppData\Local\Temp\49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
PID:1684
-
C:\Windows\system32\taskeng.exetaskeng.exe {4A04C0CC-E261-4D11-B7AF-1311B2CDDD93} S-1-5-21-2277218442-1199762539-2004043321-1000:AUVQQRRF\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:2040 -
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exeC:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:880
-
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exeC:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:1504
-
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exeC:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe2⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:468
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
Filesize1.2MB
MD5597f6110fa73a2bad89341afed59cd97
SHA1f17fe429934d5f23219aa3fda89e078efbd9daf1
SHA25649fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
SHA512606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
Filesize1.2MB
MD5597f6110fa73a2bad89341afed59cd97
SHA1f17fe429934d5f23219aa3fda89e078efbd9daf1
SHA25649fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
SHA512606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
Filesize1.2MB
MD5597f6110fa73a2bad89341afed59cd97
SHA1f17fe429934d5f23219aa3fda89e078efbd9daf1
SHA25649fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
SHA512606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea