Analysis

  • max time kernel
    142s
  • max time network
    126s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12-09-2022 15:36

General

  • Target

    85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe

  • Size

    891KB

  • MD5

    79a028ecda35a64391ae83b5d12a6bb2

  • SHA1

    346f8cc214df1864d5ca519d29cb04a98f9e119b

  • SHA256

    85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7

  • SHA512

    5ef327137ddf7c2fcbf804fd99ffbb61654c57d3ef29ffd604d72da77d75e95f22da482c5667d2f790696a25bcff152f586883f27d7f3f583087210ffdb2fa59

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe
    "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3788
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4972
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3712
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4008
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1852
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5036
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4516
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3084
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
      2⤵
        PID:4820
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1892
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
          3⤵
          • Creates scheduled task(s)
          PID:5088
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
        2⤵
          PID:3284
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8572" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
          2⤵
            PID:1708
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4273" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4428
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4273" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
              3⤵
              • Creates scheduled task(s)
              PID:1976
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6392" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1484
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk6392" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4200
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3892" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4444
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3892" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
              3⤵
              • Creates scheduled task(s)
              PID:3336
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4712
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\85473ed467abb520a0b45b67f4d05d910ee00543ce8b1272304900ea4bb794d7.exe"
              3⤵
              • Creates scheduled task(s)
              PID:5100
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3788 -s 1144
            2⤵
            • Program crash
            PID:3312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 3788 -ip 3788
          1⤵
            PID:3948

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1484-147-0x0000000000000000-mapping.dmp

          • memory/1708-145-0x0000000000000000-mapping.dmp

          • memory/1852-148-0x0000000000000000-mapping.dmp

          • memory/1892-143-0x0000000000000000-mapping.dmp

          • memory/1976-153-0x0000000000000000-mapping.dmp

          • memory/3084-154-0x0000000000000000-mapping.dmp

          • memory/3284-142-0x0000000000000000-mapping.dmp

          • memory/3336-152-0x0000000000000000-mapping.dmp

          • memory/3712-155-0x0000000000000000-mapping.dmp

          • memory/3788-135-0x0000000005360000-0x000000000536A000-memory.dmp

            Filesize

            40KB

          • memory/3788-132-0x0000000000900000-0x00000000009B0000-memory.dmp

            Filesize

            704KB

          • memory/3788-134-0x00000000053A0000-0x0000000005432000-memory.dmp

            Filesize

            584KB

          • memory/3788-133-0x0000000005950000-0x0000000005EF4000-memory.dmp

            Filesize

            5.6MB

          • memory/4008-137-0x0000000000000000-mapping.dmp

          • memory/4200-150-0x0000000000000000-mapping.dmp

          • memory/4428-144-0x0000000000000000-mapping.dmp

          • memory/4444-146-0x0000000000000000-mapping.dmp

          • memory/4516-156-0x0000000000000000-mapping.dmp

          • memory/4660-140-0x0000000000000000-mapping.dmp

          • memory/4712-139-0x0000000000000000-mapping.dmp

          • memory/4820-141-0x0000000000000000-mapping.dmp

          • memory/4972-136-0x0000000000000000-mapping.dmp

          • memory/5036-138-0x0000000000000000-mapping.dmp

          • memory/5088-151-0x0000000000000000-mapping.dmp

          • memory/5100-149-0x0000000000000000-mapping.dmp