Analysis

  • max time kernel
    23s
  • max time network
    59s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    29/09/2022, 23:02

General

  • Target

    file.exe

  • Size

    791KB

  • MD5

    216f89914606009e7d8b121fbc0c6161

  • SHA1

    5f02011c2a8db798eb809843894618edd3cc6393

  • SHA256

    8ce9e41062f4e8a223b86ecb777d5fa9ff42bc4b3a9d924c301eefe42c3a6f82

  • SHA512

    24a21bff3d2760aff277456454218eccb0766061368609028bc3d4411039086306b037b0791f12eb62b02878699526d3b8f5ba2daf56d475a77673ce5c7b08a0

  • SSDEEP

    24576:ffqvsEz21qPnZWJRwU6obhZMIpqrgdu89fethptcUT:fyvsNsPnZWfZBqoJ8hcO

Malware Config

Signatures

  • Downloads MZ/PE file
  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of WriteProcessMemory 15 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\file.exe
    "C:\Users\Admin\AppData\Local\Temp\file.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1752
    • C:\Users\Admin\AppData\Local\Temp\file.exe
      "C:\Users\Admin\AppData\Local\Temp\file.exe"
      2⤵
      • Adds Run key to start application
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:864
      • C:\Windows\SysWOW64\icacls.exe
        icacls "C:\Users\Admin\AppData\Local\a15c7113-cb14-4912-83b9-d5545a22a2a7" /deny *S-1-1-0:(OI)(CI)(DE,DC)
        3⤵
        • Modifies file permissions
        PID:1560
      • C:\Users\Admin\AppData\Local\Temp\file.exe
        "C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask
        3⤵
          PID:1772
          • C:\Users\Admin\AppData\Local\Temp\file.exe
            "C:\Users\Admin\AppData\Local\Temp\file.exe" --Admin IsNotAutoStart IsNotTask
            4⤵
              PID:768
              • C:\Users\Admin\AppData\Local\383b60fc-88db-4a72-be11-56b0fb516304\build2.exe
                "C:\Users\Admin\AppData\Local\383b60fc-88db-4a72-be11-56b0fb516304\build2.exe"
                5⤵
                  PID:1964
                  • C:\Users\Admin\AppData\Local\383b60fc-88db-4a72-be11-56b0fb516304\build2.exe
                    "C:\Users\Admin\AppData\Local\383b60fc-88db-4a72-be11-56b0fb516304\build2.exe"
                    6⤵
                      PID:836
                  • C:\Users\Admin\AppData\Local\383b60fc-88db-4a72-be11-56b0fb516304\build3.exe
                    "C:\Users\Admin\AppData\Local\383b60fc-88db-4a72-be11-56b0fb516304\build3.exe"
                    5⤵
                      PID:268
                      • C:\Windows\SysWOW64\schtasks.exe
                        /C /create /F /sc minute /mo 1 /tn "Azure-Update-Task" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Network\mstsca.exe"
                        6⤵
                        • Creates scheduled task(s)
                        PID:1624

            Network

                  MITRE ATT&CK Enterprise v6

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/768-74-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/768-73-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/836-95-0x0000000000400000-0x000000000045B000-memory.dmp

                    Filesize

                    364KB

                  • memory/836-94-0x0000000000400000-0x000000000045B000-memory.dmp

                    Filesize

                    364KB

                  • memory/836-99-0x0000000061E00000-0x0000000061EF3000-memory.dmp

                    Filesize

                    972KB

                  • memory/836-84-0x0000000000400000-0x000000000045B000-memory.dmp

                    Filesize

                    364KB

                  • memory/836-98-0x0000000000400000-0x000000000045B000-memory.dmp

                    Filesize

                    364KB

                  • memory/864-67-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/864-60-0x0000000076261000-0x0000000076263000-memory.dmp

                    Filesize

                    8KB

                  • memory/864-61-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/864-55-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/864-62-0x0000000000400000-0x0000000000537000-memory.dmp

                    Filesize

                    1.2MB

                  • memory/1752-59-0x00000000004D0000-0x00000000005EB000-memory.dmp

                    Filesize

                    1.1MB

                  • memory/1752-54-0x0000000000220000-0x00000000002B1000-memory.dmp

                    Filesize

                    580KB

                  • memory/1752-58-0x0000000000220000-0x00000000002B1000-memory.dmp

                    Filesize

                    580KB

                  • memory/1772-66-0x00000000002A0000-0x0000000000331000-memory.dmp

                    Filesize

                    580KB

                  • memory/1772-71-0x00000000002A0000-0x0000000000331000-memory.dmp

                    Filesize

                    580KB

                  • memory/1964-93-0x0000000000270000-0x00000000002B7000-memory.dmp

                    Filesize

                    284KB

                  • memory/1964-90-0x000000000059E000-0x00000000005C7000-memory.dmp

                    Filesize

                    164KB