Analysis

  • max time kernel
    55s
  • max time network
    119s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    06-10-2022 12:20

General

  • Target

    2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe

  • Size

    953KB

  • MD5

    e1d9d1bf8730046d3a75b4cc2bb3a1be

  • SHA1

    ac3d8dc31c5ed5cb5fcd4560660637983f134e0b

  • SHA256

    2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a

  • SHA512

    1536f3eaa92eeaeb104a97e9fcfb2da033bea161d053352c7020bb05aea8cee7396ee342d09e394653fb738852857776d4a568b7807cd93b97f9f820641dd1b1

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe
    "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2340
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
      2⤵
        PID:5020
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
        2⤵
          PID:5076
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3780
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4240
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
          2⤵
            PID:1936
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk7907" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
            2⤵
              PID:3332
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6221" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1512
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk6221" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4236
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3840" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:2704
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk3840" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4160
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1984
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                3⤵
                • Creates scheduled task(s)
                PID:3412
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
              2⤵
                PID:3508
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4480
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                  3⤵
                  • Creates scheduled task(s)
                  PID:3716
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3444
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                  3⤵
                  • Creates scheduled task(s)
                  PID:3680
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9180" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4600
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk9180" /TR "C:\Users\Admin\AppData\Local\Temp\2e5ab5115d5b3db9ed61152ae4d5195272b8acc6d16202802301bb477a55895a.exe"
                  3⤵
                  • Creates scheduled task(s)
                  PID:3256
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2340 -s 1320
                2⤵
                • Program crash
                PID:3320

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/1512-214-0x0000000000000000-mapping.dmp

            • memory/1936-181-0x0000000000000000-mapping.dmp

            • memory/1936-189-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/1984-200-0x0000000000000000-mapping.dmp

            • memory/2340-162-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-129-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-126-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-127-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-128-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-166-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-130-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-132-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-131-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-133-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-134-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-135-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-136-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-137-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-138-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-139-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-140-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-141-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-142-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-143-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-144-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-145-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-146-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-147-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-148-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-149-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-150-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-151-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-152-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-153-0x00000000000A0000-0x0000000000150000-memory.dmp

              Filesize

              704KB

            • memory/2340-165-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-155-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-156-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-157-0x0000000004DD0000-0x00000000052CE000-memory.dmp

              Filesize

              5.0MB

            • memory/2340-158-0x00000000049B0000-0x0000000004A42000-memory.dmp

              Filesize

              584KB

            • memory/2340-159-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-160-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-161-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-120-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-163-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-121-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-154-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-125-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-167-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-168-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-169-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-170-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-171-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-172-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-173-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-174-0x0000000004980000-0x000000000498A000-memory.dmp

              Filesize

              40KB

            • memory/2340-122-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-123-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-124-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2340-164-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/2704-204-0x0000000000000000-mapping.dmp

            • memory/3256-252-0x0000000000000000-mapping.dmp

            • memory/3332-209-0x0000000000000000-mapping.dmp

            • memory/3412-249-0x0000000000000000-mapping.dmp

            • memory/3444-185-0x0000000000000000-mapping.dmp

            • memory/3444-193-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/3508-195-0x0000000000000000-mapping.dmp

            • memory/3680-248-0x0000000000000000-mapping.dmp

            • memory/3716-247-0x0000000000000000-mapping.dmp

            • memory/3780-192-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/3780-184-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/3780-188-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/3780-178-0x0000000000000000-mapping.dmp

            • memory/4160-250-0x0000000000000000-mapping.dmp

            • memory/4236-246-0x0000000000000000-mapping.dmp

            • memory/4240-251-0x0000000000000000-mapping.dmp

            • memory/4480-190-0x0000000000000000-mapping.dmp

            • memory/4600-219-0x0000000000000000-mapping.dmp

            • memory/5020-175-0x0000000000000000-mapping.dmp

            • memory/5020-186-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5020-179-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5020-182-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5020-177-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5076-183-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5076-176-0x0000000000000000-mapping.dmp

            • memory/5076-191-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5076-180-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB

            • memory/5076-187-0x0000000077540000-0x00000000776CE000-memory.dmp

              Filesize

              1.6MB