Analysis
-
max time kernel
204s -
max time network
211s -
platform
windows10-2004_x64 -
resource
win10v2004-20220414-en -
submitted
12-07-2022 14:58
Static task
static1
Behavioral task
behavioral1
Sample
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
Resource
win7-20220414-en
Behavioral task
behavioral2
Sample
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
Resource
win10v2004-20220414-en
General
-
Target
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
-
Size
1.2MB
-
MD5
597f6110fa73a2bad89341afed59cd97
-
SHA1
f17fe429934d5f23219aa3fda89e078efbd9daf1
-
SHA256
49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
-
SHA512
606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4952 mmcbase.exe 5020 mmcbase.exe 4988 mmcbase.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
AutoIT Executable 3 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/files/0x00060000000231dc-130.dat autoit_exe behavioral2/files/0x00060000000231dc-131.dat autoit_exe behavioral2/files/0x00060000000231dc-132.dat autoit_exe -
Drops file in System32 directory 3 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\WinMgmts:\ mmcbase.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ mmcbase.exe File opened for modification C:\Windows\SysWOW64\WinMgmts:\ mmcbase.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\WinMgmts:\ 49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe 5020 mmcbase.exe -
Suspicious behavior: RenamesItself 1 IoCs
pid Process 1844 49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe"C:\Users\Admin\AppData\Local\Temp\49fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51.exe"1⤵
- NTFS ADS
- Suspicious behavior: RenamesItself
PID:1844
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exeC:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4952
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exeC:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
PID:5020
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exeC:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe1⤵
- Executes dropped EXE
- Drops file in System32 directory
PID:4988
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
Filesize1.2MB
MD5597f6110fa73a2bad89341afed59cd97
SHA1f17fe429934d5f23219aa3fda89e078efbd9daf1
SHA25649fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
SHA512606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
Filesize1.2MB
MD5597f6110fa73a2bad89341afed59cd97
SHA1f17fe429934d5f23219aa3fda89e078efbd9daf1
SHA25649fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
SHA512606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea
-
C:\ProgramData\amd64_microsoft-windows-directui.resources_31bf3856ad364e35_10.0.14393.0_es-es_9b6c370efcbc69d4\mmcbase.exe
Filesize1.2MB
MD5597f6110fa73a2bad89341afed59cd97
SHA1f17fe429934d5f23219aa3fda89e078efbd9daf1
SHA25649fc3ac3e2f2737dfac36b8daca0e77d842e4909cec5f5aad4c56667c0303b51
SHA512606b1a3d1b21635a1bf2f7a06ead437bedd00797489a88196108c93037d57f8d26c2db825cdb5ebbd6a7d5e7167f1313c2f597c6ea5c007b8aa581bee64cb9ea