Analysis

  • max time kernel
    31s
  • platform
    windows7_x64
  • resource
    win7-20220901-en
  • resource tags

    arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system
  • submitted
    07/10/2022, 08:50

General

  • Target

    1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe

  • Size

    284KB

  • MD5

    fb8aef85ad5fb2873eda949178cf8a00

  • SHA1

    f3565033a8ab76eb7aa1e0a5364d3d71455373c1

  • SHA256

    1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317

  • SHA512

    165156521d2f4b48967324eabae3ea62de3d839dd5f33ea8fdcb2f09ce3c0f044340ba8bb156d4d03951b54bfae0d5c7ba9db1c873a112be16b372b2451a6c74

  • SSDEEP

    6144:Brq1DpbALpjsdM7NNW3C34CUohAATgFct:Br2bANo0WGUoNTg0

Score
1/10

Malware Config

Signatures

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Kills process with taskkill 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 21 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe
    "C:\Users\Admin\AppData\Local\Temp\1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2012
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c del 1.bat
      2⤵
        PID:1280
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c 1.bat
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:2000
        • C:\Windows\system32\schtasks.exe
          schtasks /f /create /tn "▓Γ╩╘UAC" /tr "C:\Users\Admin\AppData\Local\Temp\1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe" /rl highest /sc ONLOGON
          3⤵
          • Creates scheduled task(s)
          PID:1728
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c taskkill -f -im "pid pe 1"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1988
        • C:\Windows\system32\taskkill.exe
          taskkill -f -im "pid pe 1"
          3⤵
          • Kills process with taskkill
          • Suspicious use of AdjustPrivilegeToken
          PID:368
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c schtasks /f /delete /tn "²âÊÔUAC"
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1556
        • C:\Windows\system32\schtasks.exe
          schtasks /f /delete /tn "²âÊÔUAC"
          3⤵
            PID:996

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Local\Temp\1.bat

        Filesize

        166B

        MD5

        f6afbe694316403ac7715732cf7d83bc

        SHA1

        85b68dc8da9c382c92f52358bf7ac51de5679233

        SHA256

        a14ed180d58a595254a95d5365f32ce6c26a3eea597bb0c4023a9f88fd46dfbe

        SHA512

        92f4c2af47f7166b9654474a37883af2af0e4d045d036b8a352ba1dc7f5f702e8c4619434dcab1ccac5e9570726fd23dd2e5eb074756da00bfc3460c24223f82