Analysis

  • max time kernel
    51s
  • max time network
    115s
  • platform
    windows10-1703_x64
  • resource
    win10-20220901-en
  • resource tags

    arch:x64arch:x86image:win10-20220901-enlocale:en-usos:windows10-1703-x64system
  • submitted
    07-10-2022 03:00

General

  • Target

    07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe

  • Size

    955KB

  • MD5

    dffe60d13a907da6e0a60f8dace4229a

  • SHA1

    c3dfbca44fe51a2cfbfc4820712990f51432508c

  • SHA256

    07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4

  • SHA512

    0c01ac8224096bf527583d1078aacc474eced1ffe5948e5e0ae84f5754878fa52396112e66fc98ffcb206a61d7c783168816517619259fb4691211e93c763290

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 54 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe
    "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2240
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
      2⤵
        PID:1136
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:4428
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
          3⤵
          • Creates scheduled task(s)
          PID:4992
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
        2⤵
          PID:2928
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2212
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4676
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
          2⤵
            PID:3328
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3448
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
              3⤵
              • Creates scheduled task(s)
              PID:5080
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:1388
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4384
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:4932
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
              3⤵
              • Creates scheduled task(s)
              PID:4432
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3931" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3384
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk3931" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
              3⤵
              • Creates scheduled task(s)
              PID:2748
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3929" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
            2⤵
              PID:520
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk3081" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
              2⤵
                PID:4216
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk1397" /TR "C:\Users\Admin\AppData\Local\Temp\07332b1009bfcd17f68c692d54f331247b6985e0fc8279b2be2d4e5be780a1d4.exe"
                2⤵
                  PID:4476
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2240 -s 1404
                  2⤵
                  • Program crash
                  PID:1800

              Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/520-219-0x0000000000000000-mapping.dmp

              • memory/1136-175-0x0000000000000000-mapping.dmp

              • memory/1136-179-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/1136-186-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/1136-182-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/1136-177-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/1388-199-0x0000000000000000-mapping.dmp

              • memory/2212-194-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2212-178-0x0000000000000000-mapping.dmp

              • memory/2212-184-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2212-189-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-141-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-168-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-133-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-134-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-135-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-136-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-137-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-138-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-139-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-140-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-120-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-142-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-143-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-144-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-145-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-146-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-147-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-148-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-149-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-150-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-151-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-152-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-153-0x0000000000ED0000-0x0000000000F80000-memory.dmp

                Filesize

                704KB

              • memory/2240-154-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-155-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-156-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-157-0x0000000005DF0000-0x00000000062EE000-memory.dmp

                Filesize

                5.0MB

              • memory/2240-158-0x0000000005820000-0x00000000058B2000-memory.dmp

                Filesize

                584KB

              • memory/2240-159-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-160-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-161-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-162-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-163-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-164-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-165-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-166-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-167-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-132-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-169-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-170-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-171-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-172-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-173-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-174-0x00000000057A0000-0x00000000057AA000-memory.dmp

                Filesize

                40KB

              • memory/2240-131-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-121-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-130-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-129-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-122-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-128-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-123-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-124-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-127-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-126-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2240-125-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2748-277-0x0000000000000000-mapping.dmp

              • memory/2928-187-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/2928-181-0x0000000000000000-mapping.dmp

              • memory/2928-191-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/3328-192-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/3328-183-0x0000000000000000-mapping.dmp

              • memory/3384-214-0x0000000000000000-mapping.dmp

              • memory/3448-188-0x0000000000000000-mapping.dmp

              • memory/4216-210-0x0000000000000000-mapping.dmp

              • memory/4384-271-0x0000000000000000-mapping.dmp

              • memory/4428-190-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/4428-185-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/4428-176-0x0000000000000000-mapping.dmp

              • memory/4428-180-0x00000000779B0000-0x0000000077B3E000-memory.dmp

                Filesize

                1.6MB

              • memory/4432-247-0x0000000000000000-mapping.dmp

              • memory/4476-205-0x0000000000000000-mapping.dmp

              • memory/4676-245-0x0000000000000000-mapping.dmp

              • memory/4932-193-0x0000000000000000-mapping.dmp

              • memory/4992-250-0x0000000000000000-mapping.dmp

              • memory/5080-246-0x0000000000000000-mapping.dmp