Analysis

  • max time kernel
    56s
  • max time network
    119s
  • platform
    windows10-1703_x64
  • resource
    win10-20220722-en
  • resource tags

    arch:x64arch:x86image:win10-20220722-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-08-2022 07:02

General

  • Target

    31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe

  • Size

    772KB

  • MD5

    dfb7617f9cbbbd63c9bc435e074db316

  • SHA1

    aae62c0980f242cf5ac013942f2491672287dbde

  • SHA256

    31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9

  • SHA512

    7adc4f275ef6b99e3ebd1e0ff27cfc9a58c4e804a3d109ced82f52f192fee6e9ec9d7d2c67c353bd9f53423eeb66bf2c50a6ebc4def500b811dae6d14f671245

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe
    "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2352
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
      2⤵
        PID:4864
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1436
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4324
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
        2⤵
          PID:3680
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3192
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4332
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3664
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4300
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
          2⤵
            PID:5100
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9400" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4420
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9400" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4336
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5535" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3796
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5535" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4344
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7994" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3832
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7994" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4524
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7005" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
            2⤵
              PID:2248
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2836
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4296
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3492
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\31c88045036814e9ae3068c27322dba5f98b6eb061b6b9cc12094313247c08c9.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4884
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 1320
              2⤵
              • Program crash
              PID:2256

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1436-185-0x0000000000000000-mapping.dmp

          • memory/1436-198-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/1436-188-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/1436-193-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2248-212-0x0000000000000000-mapping.dmp

          • memory/2352-171-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-137-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-134-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-135-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-136-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-174-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-138-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-139-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-140-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-141-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-142-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-143-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-144-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-145-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-146-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-147-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-149-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-148-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-151-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-150-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-152-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-153-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-154-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-155-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-156-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-157-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-158-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-159-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-160-0x0000000000A20000-0x0000000000AD0000-memory.dmp

            Filesize

            704KB

          • memory/2352-161-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-173-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-163-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-164-0x0000000005840000-0x0000000005D3E000-memory.dmp

            Filesize

            5.0MB

          • memory/2352-165-0x0000000005340000-0x00000000053D2000-memory.dmp

            Filesize

            584KB

          • memory/2352-166-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-167-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-168-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-169-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-170-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-127-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-128-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-162-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-132-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-175-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-176-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-177-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-178-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-179-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-180-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-181-0x00000000052F0000-0x00000000052FA000-memory.dmp

            Filesize

            40KB

          • memory/2352-129-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-133-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-130-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-172-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2352-131-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/2836-207-0x0000000000000000-mapping.dmp

          • memory/3192-196-0x0000000000000000-mapping.dmp

          • memory/3492-201-0x0000000000000000-mapping.dmp

          • memory/3664-191-0x0000000000000000-mapping.dmp

          • memory/3664-200-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/3680-194-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/3680-187-0x0000000000000000-mapping.dmp

          • memory/3680-199-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/3796-222-0x0000000000000000-mapping.dmp

          • memory/3832-217-0x0000000000000000-mapping.dmp

          • memory/4296-259-0x0000000000000000-mapping.dmp

          • memory/4300-258-0x0000000000000000-mapping.dmp

          • memory/4324-255-0x0000000000000000-mapping.dmp

          • memory/4332-254-0x0000000000000000-mapping.dmp

          • memory/4336-257-0x0000000000000000-mapping.dmp

          • memory/4344-253-0x0000000000000000-mapping.dmp

          • memory/4420-228-0x0000000000000000-mapping.dmp

          • memory/4524-256-0x0000000000000000-mapping.dmp

          • memory/4864-182-0x0000000000000000-mapping.dmp

          • memory/4864-190-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/4864-186-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/4864-195-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/4864-184-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/4884-260-0x0000000000000000-mapping.dmp

          • memory/5100-183-0x0000000000000000-mapping.dmp

          • memory/5100-197-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/5100-189-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB

          • memory/5100-192-0x00000000776D0000-0x000000007785E000-memory.dmp

            Filesize

            1.6MB