Analysis
-
max time kernel
250s -
max time network
46s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
19/10/2022, 22:16
Static task
static1
Behavioral task
behavioral1
Sample
07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe
Resource
win10-20220812-en
General
-
Target
07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe
-
Size
7.0MB
-
MD5
1c2f466196326fa136c2d1c42be9bd77
-
SHA1
fd85fcae75e8533289a0a59c960aa014a98499d7
-
SHA256
07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4
-
SHA512
660b50fe4b1638fa9d0e0c0af5bd5c85dac431deee58c2cfda70a5a786ad39e68a56a437580d46a93f8ac0d565f46136464d959bc6dfb019b1886d4152efa423
-
SSDEEP
98304:Bh1tZKAAphHwwYzJac9wC17eDJeW+rbFuoJ8q0e7XOI2Cfn/NzNf0X/Spd2:0xpjc9wSeQhFdaneiI2m/G/Spg
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1480 DevicePairingWizard.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1100 992 WerFault.exe 26 -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 916 schtasks.exe 668 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 1480 DevicePairingWizard.exe -
Suspicious use of WriteProcessMemory 16 IoCs
description pid Process procid_target PID 992 wrote to memory of 916 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 27 PID 992 wrote to memory of 916 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 27 PID 992 wrote to memory of 916 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 27 PID 992 wrote to memory of 916 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 27 PID 992 wrote to memory of 1616 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 29 PID 992 wrote to memory of 1616 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 29 PID 992 wrote to memory of 1616 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 29 PID 992 wrote to memory of 1616 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 29 PID 992 wrote to memory of 1100 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 32 PID 992 wrote to memory of 1100 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 32 PID 992 wrote to memory of 1100 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 32 PID 992 wrote to memory of 1100 992 07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe 32 PID 1532 wrote to memory of 1480 1532 taskeng.exe 34 PID 1532 wrote to memory of 1480 1532 taskeng.exe 34 PID 1532 wrote to memory of 1480 1532 taskeng.exe 34 PID 1532 wrote to memory of 1480 1532 taskeng.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe"C:\Users\Admin\AppData\Local\Temp\07215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:992 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "Device Pairing Application Wizard (580398372)" /tr "C:\Users\Admin\AppData\Roaming\DevicePairing\DevicePairingWizard.exe"2⤵
- Creates scheduled task(s)
PID:916
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "Device Pairing Application Wizard (580398372)"2⤵PID:1616
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "Device Pairing Application Wizard (580398372)" /XML "C:\Users\Admin\AppData\Roaming\DevicePairing\kW4oL9fL8aE5hC1a"2⤵
- Creates scheduled task(s)
PID:668
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 992 -s 1922⤵
- Program crash
PID:1100
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {64C33C34-4D8B-45A3-B6D4-A04079FF9E45} S-1-5-21-4063495947-34355257-727531523-1000:RYNKSFQE\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1532 -
C:\Users\Admin\AppData\Roaming\DevicePairing\DevicePairingWizard.exeC:\Users\Admin\AppData\Roaming\DevicePairing\DevicePairingWizard.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
PID:1480
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
7.0MB
MD51c2f466196326fa136c2d1c42be9bd77
SHA1fd85fcae75e8533289a0a59c960aa014a98499d7
SHA25607215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4
SHA512660b50fe4b1638fa9d0e0c0af5bd5c85dac431deee58c2cfda70a5a786ad39e68a56a437580d46a93f8ac0d565f46136464d959bc6dfb019b1886d4152efa423
-
Filesize
7.0MB
MD51c2f466196326fa136c2d1c42be9bd77
SHA1fd85fcae75e8533289a0a59c960aa014a98499d7
SHA25607215da0bcabdffde7b48d6a6317e740c3cc5a3cc0679353862a1d3b29c435e4
SHA512660b50fe4b1638fa9d0e0c0af5bd5c85dac431deee58c2cfda70a5a786ad39e68a56a437580d46a93f8ac0d565f46136464d959bc6dfb019b1886d4152efa423