Analysis

  • max time kernel
    143s
  • max time network
    146s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    12/09/2022, 13:25

General

  • Target

    100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe

  • Size

    891KB

  • MD5

    89f1d08119e5c110c0c2583d658a472a

  • SHA1

    7985eb6c1edc62fb12f080f70902bb213386e528

  • SHA256

    100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7

  • SHA512

    9991a6628ba7516ac113b2cf4c5f488534f3e0b5f11b2c0fec3ccae88f3cfb2df893f01479de0fbecf9e16f0ba78bf2950d3141b7f30a20c565ef7833ebd7128

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe
    "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1112
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
      2⤵
        PID:4648
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2236
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4764
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4840
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
        2⤵
          PID:4836
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
          2⤵
            PID:2356
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3588
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4440
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk9068" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
            2⤵
              PID:4068
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2154" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3752
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2154" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
                3⤵
                • Creates scheduled task(s)
                PID:2312
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6847" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4296
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6847" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
                3⤵
                • Creates scheduled task(s)
                PID:3264
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7700" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2224
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk7700" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
                3⤵
                • Creates scheduled task(s)
                PID:3180
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2012
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4444
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4208
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\100ebcee9b3262451e5d499231632e4e884ee9f2d24d5e381b4cfc009897b2f7.exe"
                3⤵
                • Creates scheduled task(s)
                PID:3200
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1112 -s 1364
              2⤵
              • Program crash
              PID:280

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/1112-164-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-147-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-122-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-123-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-124-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-125-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-126-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-127-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-128-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-129-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-130-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-131-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-132-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-133-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-134-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-135-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-136-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-137-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-138-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-139-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-140-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-141-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-142-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-143-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-162-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-145-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-146-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-163-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-148-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-149-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-150-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-151-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-152-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-153-0x00000000009A0000-0x0000000000A50000-memory.dmp

                  Filesize

                  704KB

                • memory/1112-154-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-155-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-156-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-157-0x00000000057D0000-0x0000000005CCE000-memory.dmp

                  Filesize

                  5.0MB

                • memory/1112-158-0x00000000052D0000-0x0000000005362000-memory.dmp

                  Filesize

                  584KB

                • memory/1112-159-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-160-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-161-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-144-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-121-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-120-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-165-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-166-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-167-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-168-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-169-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-170-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-171-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-172-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-173-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/1112-174-0x0000000005280000-0x000000000528A000-memory.dmp

                  Filesize

                  40KB

                • memory/4648-184-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4648-187-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4648-177-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4648-179-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4764-192-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4764-188-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4764-183-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4764-180-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4808-186-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4808-191-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4808-182-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4836-193-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4836-189-0x0000000076FB0000-0x000000007713E000-memory.dmp

                  Filesize

                  1.6MB