Analysis

  • max time kernel
    54s
  • max time network
    117s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    30-09-2022 23:16

General

  • Target

    aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe

  • Size

    939KB

  • MD5

    bbeacdba8d763499cbfee781db9ec22c

  • SHA1

    464f7119c778aeca2066e2385e8aa68b0e6e36d4

  • SHA256

    aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224

  • SHA512

    d581f30114936460700f6036b7f8d3294a8dba995337e75611aae3dca7368bd630d475f66374207aa0b1a36488ebb494ce116d377439806b797756e1ee60775e

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 8 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe
    "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2208
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:5072
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4604
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
      2⤵
        PID:5080
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4228
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4180
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2056
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
          3⤵
          • Creates scheduled task(s)
          PID:3260
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2220
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
          3⤵
          • Creates scheduled task(s)
          PID:3716
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3872" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
        2⤵
          PID:1364
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5427" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4616
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk5427" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4236
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk201" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
          2⤵
            PID:4120
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5541" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3824
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk5541" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4168
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
            2⤵
              PID:3336
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:3160
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4544
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2500
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\aa1fa682f6f06d294b3c9748cea86a778931edd24efa15c1e0d24d22c25f8224.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4508
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 1380
              2⤵
              • Program crash
              PID:208

          Network

          MITRE ATT&CK Enterprise v6

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • memory/1364-215-0x0000000000000000-mapping.dmp

          • memory/2056-181-0x0000000000000000-mapping.dmp

          • memory/2056-189-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2056-193-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-164-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-153-0x0000000000F50000-0x0000000001000000-memory.dmp

            Filesize

            704KB

          • memory/2208-126-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-127-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-128-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-129-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-130-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-131-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-132-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-133-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-134-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-135-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-136-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-137-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-138-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-139-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-140-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-141-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-142-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-143-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-144-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-145-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-146-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-120-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-148-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-149-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-150-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-151-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-152-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-165-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-154-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-155-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-156-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-157-0x0000000005CF0000-0x00000000061EE000-memory.dmp

            Filesize

            5.0MB

          • memory/2208-158-0x0000000005890000-0x0000000005922000-memory.dmp

            Filesize

            584KB

          • memory/2208-159-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-160-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-161-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-162-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-163-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-147-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-125-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-121-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-167-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-168-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-169-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-170-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-171-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-172-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-173-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-174-0x0000000005840000-0x000000000584A000-memory.dmp

            Filesize

            40KB

          • memory/2208-122-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-166-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-123-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2208-124-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/2220-200-0x0000000000000000-mapping.dmp

          • memory/2500-186-0x0000000000000000-mapping.dmp

          • memory/3160-191-0x0000000000000000-mapping.dmp

          • memory/3260-244-0x0000000000000000-mapping.dmp

          • memory/3336-196-0x0000000000000000-mapping.dmp

          • memory/3716-248-0x0000000000000000-mapping.dmp

          • memory/3824-205-0x0000000000000000-mapping.dmp

          • memory/4120-210-0x0000000000000000-mapping.dmp

          • memory/4168-251-0x0000000000000000-mapping.dmp

          • memory/4180-250-0x0000000000000000-mapping.dmp

          • memory/4228-190-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/4228-185-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/4228-178-0x0000000000000000-mapping.dmp

          • memory/4228-182-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/4236-249-0x0000000000000000-mapping.dmp

          • memory/4508-245-0x0000000000000000-mapping.dmp

          • memory/4544-246-0x0000000000000000-mapping.dmp

          • memory/4604-247-0x0000000000000000-mapping.dmp

          • memory/4616-220-0x0000000000000000-mapping.dmp

          • memory/5072-175-0x0000000000000000-mapping.dmp

          • memory/5072-179-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5072-183-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5072-177-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5072-187-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5080-188-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5080-180-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5080-176-0x0000000000000000-mapping.dmp

          • memory/5080-184-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB

          • memory/5080-192-0x0000000077540000-0x00000000776CE000-memory.dmp

            Filesize

            1.6MB