Analysis
-
max time kernel
31s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/10/2022, 08:50
Static task
static1
Behavioral task
behavioral1
Sample
1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe
Resource
win10v2004-20220812-en
General
-
Target
1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe
-
Size
284KB
-
MD5
fb8aef85ad5fb2873eda949178cf8a00
-
SHA1
f3565033a8ab76eb7aa1e0a5364d3d71455373c1
-
SHA256
1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317
-
SHA512
165156521d2f4b48967324eabae3ea62de3d839dd5f33ea8fdcb2f09ce3c0f044340ba8bb156d4d03951b54bfae0d5c7ba9db1c873a112be16b372b2451a6c74
-
SSDEEP
6144:Brq1DpbALpjsdM7NNW3C34CUohAATgFct:Br2bANo0WGUoNTg0
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1728 schtasks.exe -
Kills process with taskkill 1 IoCs
pid Process 368 taskkill.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe Token: SeDebugPrivilege 368 taskkill.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1280 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 28 PID 2012 wrote to memory of 1280 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 28 PID 2012 wrote to memory of 1280 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 28 PID 2012 wrote to memory of 2000 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 29 PID 2012 wrote to memory of 2000 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 29 PID 2012 wrote to memory of 2000 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 29 PID 2000 wrote to memory of 1728 2000 cmd.exe 30 PID 2000 wrote to memory of 1728 2000 cmd.exe 30 PID 2000 wrote to memory of 1728 2000 cmd.exe 30 PID 2012 wrote to memory of 1988 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 31 PID 2012 wrote to memory of 1988 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 31 PID 2012 wrote to memory of 1988 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 31 PID 1988 wrote to memory of 368 1988 cmd.exe 32 PID 1988 wrote to memory of 368 1988 cmd.exe 32 PID 1988 wrote to memory of 368 1988 cmd.exe 32 PID 2012 wrote to memory of 1556 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 34 PID 2012 wrote to memory of 1556 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 34 PID 2012 wrote to memory of 1556 2012 1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe 34 PID 1556 wrote to memory of 996 1556 cmd.exe 35 PID 1556 wrote to memory of 996 1556 cmd.exe 35 PID 1556 wrote to memory of 996 1556 cmd.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe"C:\Users\Admin\AppData\Local\Temp\1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c del 1.bat2⤵PID:1280
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c 1.bat2⤵
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Windows\system32\schtasks.exeschtasks /f /create /tn "▓Γ╩╘UAC" /tr "C:\Users\Admin\AppData\Local\Temp\1671d731a1b0faa0608a0f356d0d9910c87230e6fb7328f2486d79af88eb1317.exe" /rl highest /sc ONLOGON3⤵
- Creates scheduled task(s)
PID:1728
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c taskkill -f -im "pid pe 1"2⤵
- Suspicious use of WriteProcessMemory
PID:1988 -
C:\Windows\system32\taskkill.exetaskkill -f -im "pid pe 1"3⤵
- Kills process with taskkill
- Suspicious use of AdjustPrivilegeToken
PID:368
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /f /delete /tn "²âÊÔUAC"2⤵
- Suspicious use of WriteProcessMemory
PID:1556 -
C:\Windows\system32\schtasks.exeschtasks /f /delete /tn "²âÊÔUAC"3⤵PID:996
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
166B
MD5f6afbe694316403ac7715732cf7d83bc
SHA185b68dc8da9c382c92f52358bf7ac51de5679233
SHA256a14ed180d58a595254a95d5365f32ce6c26a3eea597bb0c4023a9f88fd46dfbe
SHA51292f4c2af47f7166b9654474a37883af2af0e4d045d036b8a352ba1dc7f5f702e8c4619434dcab1ccac5e9570726fd23dd2e5eb074756da00bfc3460c24223f82