Analysis

  • max time kernel
    42s
  • max time network
    117s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220901-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system
  • submitted
    26/09/2022, 12:29

General

  • Target

    3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe

  • Size

    927KB

  • MD5

    d7297b7b05d3168243b0ed636261ec6c

  • SHA1

    7ce203a3b55a5714a3f2a825564b44331a41580c

  • SHA256

    3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f

  • SHA512

    69438fc8f2c92eb80bfdfb743f19071c92f8adc5848c42f86a68dd1ee4de5129743c8b147586eaa9b3a58f96cbfca44b3c1e9d2994ebc7a38c3e6c56188e7ad6

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 10 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe
    "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1288
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2376
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1404
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1708
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:756
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:804
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4696
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4024
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4532
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2284
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4792
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2700
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1348
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk546" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3460
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk546" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:868
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk724" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
      2⤵
        PID:3920
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3538" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1128
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3538" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
          3⤵
          • Creates scheduled task(s)
          PID:3344
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk2141" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
        2⤵
          PID:4308
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3292
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\3fa02897f9434987e00b1e28538ca04668e321e3de0a7ccca611bb8726d7ba0f.exe"
            3⤵
            • Creates scheduled task(s)
            PID:1540
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1288 -s 1364
          2⤵
          • Program crash
          PID:2888
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 460 -p 1288 -ip 1288
        1⤵
          PID:3608

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/1288-134-0x0000000004990000-0x0000000004A22000-memory.dmp

                Filesize

                584KB

              • memory/1288-132-0x0000000000060000-0x0000000000110000-memory.dmp

                Filesize

                704KB

              • memory/1288-133-0x00000000050A0000-0x0000000005644000-memory.dmp

                Filesize

                5.6MB

              • memory/1288-135-0x0000000004980000-0x000000000498A000-memory.dmp

                Filesize

                40KB