Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    28/09/2022, 15:43

General

  • Target

    2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe

  • Size

    933KB

  • MD5

    e746c354e6361cd13548b06c55044301

  • SHA1

    8ac55c469284f3c24790d2e8444776601c948862

  • SHA256

    2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a

  • SHA512

    a316bc2789e6ecd07a965d2f7f66866ff2d3600356528dc312b31deb2a95da8d568205d6c3573959a704de6e64b1968fd596df4054e5d89cbcf2f2b54adad987

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 9 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 63 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe
    "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3512
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:356
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4868
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4104
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3772
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4160
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2500
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4580
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4292
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:948
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3140
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
      2⤵
        PID:2752
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2484" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1260
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2484" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4368
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk2001" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
        2⤵
          PID:3336
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4236
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4624
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:5048
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
            3⤵
            • Creates scheduled task(s)
            PID:3264
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk956" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
          2⤵
            PID:4132
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5547" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4032
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk5547" /TR "C:\Users\Admin\AppData\Local\Temp\2b30afa5623d51d07e47d9242d600abe87499f39e28055c30c853a3bf409360a.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4992
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3512 -s 1320
            2⤵
            • Program crash
            PID:2588

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/356-173-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/356-176-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/356-179-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/356-172-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-159-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-166-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-129-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-130-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-131-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-132-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-133-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-134-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-135-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-136-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-137-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-138-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-139-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-140-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-141-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-142-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-143-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-144-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-145-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-146-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-147-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-148-0x0000000000720000-0x00000000007D0000-memory.dmp

                Filesize

                704KB

              • memory/3512-149-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-150-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-151-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-152-0x00000000054D0000-0x00000000059CE000-memory.dmp

                Filesize

                5.0MB

              • memory/3512-153-0x0000000005070000-0x0000000005102000-memory.dmp

                Filesize

                584KB

              • memory/3512-154-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-155-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-156-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-157-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-158-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-115-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-160-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-161-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-162-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-163-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-164-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-165-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-128-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-167-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-168-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-169-0x0000000005000000-0x000000000500A000-memory.dmp

                Filesize

                40KB

              • memory/3512-127-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-126-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-116-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-118-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-117-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-119-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-125-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-124-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-123-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-120-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-121-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/3512-122-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4104-181-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4104-177-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4104-174-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4104-184-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4160-180-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4160-187-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/4160-183-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/5048-188-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB

              • memory/5048-185-0x0000000077BE0000-0x0000000077D6E000-memory.dmp

                Filesize

                1.6MB