Analysis

  • max time kernel
    91s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20220812-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/10/2022, 12:13

General

  • Target

    05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe

  • Size

    959KB

  • MD5

    9471d7350294230fcbe716f9c31986ac

  • SHA1

    1ceb53ab3d65fada161935022b88d8e9ff5b2fd0

  • SHA256

    05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c

  • SHA512

    33b8baafe3926b5a6367e21ffb7bae74a48d83660149a6218dfc9bcedfadf8b7a7d92711f0f97b48dd6dad835726726caa8be06dcb5c5c02c2ca7bdf08c6b0be

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 11 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe
    "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2728
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2380
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:1648
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2224
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4280
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2580
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4472
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2192
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:3312
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:256
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:2480
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4460" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:684
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk4460" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4340
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6449" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3508
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6449" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4568
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk2059" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
      2⤵
        PID:3728
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7755" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
        2⤵
          PID:1944
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk7755" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
            3⤵
            • Creates scheduled task(s)
            PID:2668
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:116
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
            3⤵
            • Creates scheduled task(s)
            PID:5108
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:2212
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
            3⤵
            • Creates scheduled task(s)
            PID:3556
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4180
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\05b2f3e08250a98f1733d63217b305f49133d79b02f1dfb7ed333894ea78aa6c.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4672
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2728 -s 1364
          2⤵
          • Program crash
          PID:1596
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -pss -s 428 -p 2728 -ip 2728
        1⤵
          PID:2252

        Network

              MITRE ATT&CK Enterprise v6

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • memory/2728-132-0x0000000000F90000-0x0000000001040000-memory.dmp

                Filesize

                704KB

              • memory/2728-135-0x00000000059E0000-0x00000000059EA000-memory.dmp

                Filesize

                40KB

              • memory/2728-134-0x0000000005A10000-0x0000000005AA2000-memory.dmp

                Filesize

                584KB

              • memory/2728-133-0x0000000005FC0000-0x0000000006564000-memory.dmp

                Filesize

                5.6MB