Analysis
-
max time kernel
178s -
max time network
207s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
13-10-2022 11:38
Behavioral task
behavioral1
Sample
ITSARAT.exe
Resource
win7-20220901-en
General
-
Target
ITSARAT.exe
-
Size
203KB
-
MD5
5dadfc1c90afe933eb3f76c0432a1067
-
SHA1
7f3d72b6b7d84df3f9dbc980acf19a4c588793c8
-
SHA256
eafe5062cb0fce38399521ab487ca4e7cd81c39811763c011e48921640966d34
-
SHA512
a07ddaea31c008efae8b898332aeaba239fa0f5e7f6c8050851f5f141baca76812ef41d58f6f83c7f217a94ba68635ec7e7bb00ff481c0b0d3384c48736441c8
-
SSDEEP
6144:cLV6Bta6dtJmakIM59+ZeHyUHKlbK46HylxXAjN:cLV6BtpmkdZeL2KhxjN
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ITSARAT.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Host = "C:\\Program Files (x86)\\DDP Host\\ddphost.exe" ITSARAT.exe -
Processes:
ITSARAT.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ITSARAT.exe -
Drops file in Program Files directory 2 IoCs
Processes:
ITSARAT.exedescription ioc process File created C:\Program Files (x86)\DDP Host\ddphost.exe ITSARAT.exe File opened for modification C:\Program Files (x86)\DDP Host\ddphost.exe ITSARAT.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3680 schtasks.exe 3520 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ITSARAT.exepid process 4008 ITSARAT.exe 4008 ITSARAT.exe 4008 ITSARAT.exe 4008 ITSARAT.exe 4008 ITSARAT.exe 4008 ITSARAT.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ITSARAT.exepid process 4008 ITSARAT.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
ITSARAT.exedescription pid process Token: SeDebugPrivilege 4008 ITSARAT.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ITSARAT.exedescription pid process target process PID 4008 wrote to memory of 3680 4008 ITSARAT.exe schtasks.exe PID 4008 wrote to memory of 3680 4008 ITSARAT.exe schtasks.exe PID 4008 wrote to memory of 3680 4008 ITSARAT.exe schtasks.exe PID 4008 wrote to memory of 3520 4008 ITSARAT.exe schtasks.exe PID 4008 wrote to memory of 3520 4008 ITSARAT.exe schtasks.exe PID 4008 wrote to memory of 3520 4008 ITSARAT.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ITSARAT.exe"C:\Users\Admin\AppData\Local\Temp\ITSARAT.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4008 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Host" /xml "C:\Users\Admin\AppData\Local\Temp\tmpEF80.tmp"2⤵
- Creates scheduled task(s)
PID:3680 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Host Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpF30C.tmp"2⤵
- Creates scheduled task(s)
PID:3520
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD57197d8046458b144a4a2b58ce0a87743
SHA1a84c96e0452f099157ed863bd0171d0c7c2de840
SHA256fe28b5043f9a26facb2cf80040528507259cd13ff61776f2cd9b3e8d0774e53e
SHA5120806843540037341f958b1189c8aae361b6994ef868871e403497763385033b57b3518f0f19026a4b89753bcebb4535f69b1de7ee06e9dd2b1a5c49ab14df43a
-
Filesize
1KB
MD52271642ca970891700e3f48439739ed8
SHA1cd472df2349f7db9e1e460d0ee28acd97b8a8793
SHA2567aba66abbcb0b13455609174db23aed495a9adbef0e0acd28baa9c92445eda68
SHA5124669a4ef8ec28cdb852ffc1401576b1bf9a9d837797d7d92bc88c18b3097404f36854e50167b309706fef400cabc43c876569ce2797ba85eb169a2783b8fe807