Analysis

  • max time kernel
    91s
  • max time network
    152s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    17-09-2022 00:01

General

  • Target

    b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe

  • Size

    901KB

  • MD5

    f251506360d69f104ebf4f38f5658cb5

  • SHA1

    1aeecbe214e3d51e1c1219c8a5a2c6b721dbc29a

  • SHA256

    b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d

  • SHA512

    75bf01563a901fc70802682b8fa868ef2aeef29ad77ade4bd39cdec1c76c5c7225d279d1a6993807ccefc9fb91e5f10372ec9253b5efed8f3ff78a54bffb571d

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 12 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe
    "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3996
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
      2⤵
        PID:4652
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2056
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4960
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2780
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4948
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2772
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:628
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:3452
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4808
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:5088
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3276
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2272
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4936
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          3⤵
          • Creates scheduled task(s)
          PID:2756
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
        2⤵
          PID:4900
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2788
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1309" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:1804
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1309" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2076
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8805" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4424
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk8805" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2460
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3237" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4208
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3237" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
            3⤵
            • Creates scheduled task(s)
            PID:1644
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4740" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:220
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk4740" /TR "C:\Users\Admin\AppData\Local\Temp\b6ad037d0e798cd8ce63efbb47519b2bfccf7b8d01be8b0ce7dc8073856a1a6d.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2452
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3996 -s 1372
          2⤵
          • Program crash
          PID:3804
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 200 -p 3996 -ip 3996
        1⤵
          PID:4456

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • memory/220-147-0x0000000000000000-mapping.dmp

        • memory/628-139-0x0000000000000000-mapping.dmp

        • memory/1644-153-0x0000000000000000-mapping.dmp

        • memory/1804-144-0x0000000000000000-mapping.dmp

        • memory/2076-150-0x0000000000000000-mapping.dmp

        • memory/2272-149-0x0000000000000000-mapping.dmp

        • memory/2452-154-0x0000000000000000-mapping.dmp

        • memory/2460-155-0x0000000000000000-mapping.dmp

        • memory/2756-151-0x0000000000000000-mapping.dmp

        • memory/2772-157-0x0000000000000000-mapping.dmp

        • memory/2780-152-0x0000000000000000-mapping.dmp

        • memory/3276-143-0x0000000000000000-mapping.dmp

        • memory/3452-148-0x0000000000000000-mapping.dmp

        • memory/3996-132-0x0000000000210000-0x00000000002C0000-memory.dmp

          Filesize

          704KB

        • memory/3996-135-0x0000000004E10000-0x0000000004E1A000-memory.dmp

          Filesize

          40KB

        • memory/3996-134-0x0000000004C50000-0x0000000004CE2000-memory.dmp

          Filesize

          584KB

        • memory/3996-133-0x00000000052B0000-0x0000000005854000-memory.dmp

          Filesize

          5.6MB

        • memory/4208-146-0x0000000000000000-mapping.dmp

        • memory/4424-145-0x0000000000000000-mapping.dmp

        • memory/4652-136-0x0000000000000000-mapping.dmp

        • memory/4808-142-0x0000000000000000-mapping.dmp

        • memory/4900-140-0x0000000000000000-mapping.dmp

        • memory/4936-141-0x0000000000000000-mapping.dmp

        • memory/4948-138-0x0000000000000000-mapping.dmp

        • memory/4960-137-0x0000000000000000-mapping.dmp

        • memory/5088-156-0x0000000000000000-mapping.dmp