Analysis

  • max time kernel
    77s
  • max time network
    142s
  • platform
    windows10-1703_x64
  • resource
    win10-20220812-en
  • resource tags

    arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system
  • submitted
    11/10/2022, 07:54

General

  • Target

    ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe

  • Size

    967KB

  • MD5

    5e8d16a197490bd5770c889a010dc506

  • SHA1

    75409aea12f77e1f61e2761575d81d6e9e84b2b2

  • SHA256

    ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f

  • SHA512

    d5034bf6f96696ff64cff620aec85de90d1c988d06da5ebe40ce1a8d2d32e7527f6b1edd6b3f2f57bc40bd0ff87aed40b65c9a21f25c6cb118ee5b5a6bfb0170

  • SSDEEP

    768:5RdutBr/u3GduUrRTj8ObyVUBMfSDFTh0lrpcxNq3ey16HMV1Iu3MCBo6qstNpzJ:5R4HmK3Tj8J4FPHMV1tNRLbwCX

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 9 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 7 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe
    "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:3060
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4904
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
        3⤵
        • Creates scheduled task(s)
        PID:4252
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
      2⤵
        PID:5088
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
        2⤵
          PID:4244
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:4408
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
            3⤵
            • Creates scheduled task(s)
            PID:4220
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
          2⤵
            PID:4288
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
            2⤵
            • Suspicious use of WriteProcessMemory
            PID:3428
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
              3⤵
              • Creates scheduled task(s)
              PID:696
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
            2⤵
              PID:1892
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2179" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:1200
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesService_bk2179" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4544
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6013" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
              2⤵
              • Suspicious use of WriteProcessMemory
              PID:4384
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableService_bk6013" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
                3⤵
                • Creates scheduled task(s)
                PID:4236
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
              2⤵
                PID:4076
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8110" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:4940
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesService_bk8110" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
                  3⤵
                  • Creates scheduled task(s)
                  PID:3080
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /c SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3235" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
                2⤵
                • Suspicious use of WriteProcessMemory
                PID:3476
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostService_bk3235" /TR "C:\Users\Admin\AppData\Local\Temp\ac3ba8587809db3bfac160a739ac8012b1651af8dc65c562dd45386e1ccdc55f.exe"
                  3⤵
                  • Creates scheduled task(s)
                  PID:4196
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 3060 -s 1384
                2⤵
                • Program crash
                PID:624

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/3060-158-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-144-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-121-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-122-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-123-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-124-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-125-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-126-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-127-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-128-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-129-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-130-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-131-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-132-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-133-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-134-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-135-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-136-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-137-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-138-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-159-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-140-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-141-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-142-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-143-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-161-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-145-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-146-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-147-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-148-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-149-0x0000000000E30000-0x0000000000EE0000-memory.dmp

              Filesize

              704KB

            • memory/3060-150-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-151-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-152-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-153-0x0000000005D40000-0x000000000623E000-memory.dmp

              Filesize

              5.0MB

            • memory/3060-154-0x0000000005840000-0x00000000058D2000-memory.dmp

              Filesize

              584KB

            • memory/3060-155-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-156-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-157-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-116-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-139-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-117-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-120-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-162-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-163-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-164-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-165-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-166-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-167-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-168-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-169-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-170-0x00000000032C0000-0x00000000032CA000-memory.dmp

              Filesize

              40KB

            • memory/3060-118-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-119-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/3060-160-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4244-179-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4244-183-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4244-188-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4244-176-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4288-185-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4408-189-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4904-180-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4904-173-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4904-184-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/4904-175-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/5088-178-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/5088-181-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB

            • memory/5088-187-0x0000000076FE0000-0x000000007716E000-memory.dmp

              Filesize

              1.6MB