Analysis

  • max time kernel
    90s
  • max time network
    141s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    15/09/2022, 16:36

General

  • Target

    5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe

  • Size

    898KB

  • MD5

    bd9578dd0a854168cc7125a41603a240

  • SHA1

    7f796d01e348323dfe2c27646268f6f47366d908

  • SHA256

    5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409

  • SHA512

    07385fa332cb739d6c2d29d4d7bffb3a0b6eed6a753c8319edc8986d5c55f37fe69c3e0ca34c5bbd6a80fb496b9da02fedba3b5ecd7f89c1f256aa69cac2446a

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe
    "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4036
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4368
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4412
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4240
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3188
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3628" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2240
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3628" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4648
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9645" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4336
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk9645" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4124
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2229" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3592
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2229" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3204
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4643" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4376
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4643" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3244
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1252
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2620
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
      2⤵
        PID:4280
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
        2⤵
          PID:3472
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
          2⤵
            PID:3516
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
            2⤵
              PID:2108
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 4036 -s 1316
              2⤵
              • Program crash
              PID:2332
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
            1⤵
            • Creates scheduled task(s)
            PID:4660
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\5c1f17ecccb1b5207cbccd585d1397b4ee0f49f74886bfb5d5896629ec106409.exe"
            1⤵
            • Creates scheduled task(s)
            PID:4692

          Network

                MITRE ATT&CK Enterprise v6

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/2108-175-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2108-173-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2108-178-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/2108-183-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3472-179-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3472-187-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3472-182-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3516-188-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3516-184-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3516-180-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/3516-176-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-157-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-170-0x0000000004D70000-0x0000000004D7A000-memory.dmp

                  Filesize

                  40KB

                • memory/4036-139-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-140-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-141-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-142-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-143-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-144-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-145-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-146-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-147-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-148-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-149-0x0000000000490000-0x0000000000540000-memory.dmp

                  Filesize

                  704KB

                • memory/4036-150-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-151-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-152-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-153-0x0000000005220000-0x000000000571E000-memory.dmp

                  Filesize

                  5.0MB

                • memory/4036-154-0x0000000004DC0000-0x0000000004E52000-memory.dmp

                  Filesize

                  584KB

                • memory/4036-155-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-156-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-158-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-159-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-160-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-116-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-161-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-162-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-163-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-164-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-165-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-166-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-167-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-168-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-169-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-138-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-137-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-136-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-135-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-117-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-134-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-133-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-118-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-132-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-119-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-131-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-120-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-121-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-123-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-122-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-124-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-130-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-129-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-128-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-125-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-127-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4036-126-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4368-185-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB

                • memory/4368-189-0x0000000077C20000-0x0000000077DAE000-memory.dmp

                  Filesize

                  1.6MB