Analysis
-
max time kernel
151s -
max time network
155s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
20-10-2022 16:15
Behavioral task
behavioral1
Sample
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe
Resource
win7-20220812-en
General
-
Target
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe
-
Size
208KB
-
MD5
a012c118410f3bf8b78e1b7c16d71be0
-
SHA1
fbfc56d4c047f1814f22553d843a73b718499fc8
-
SHA256
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d
-
SHA512
5226d5a5f1cb74e28bb04baa02baa03dfdc8c96b8ddd05f0abb925b4fddc04b567c0c141103752629bff8e85bcb1e70532e608327625c823c2e82137f93f12a0
-
SSDEEP
3072:QzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HIER8DYX/S+JM10Zc7g71uyxd6M:QLV6Bta6dtJmakIM5eYX/SHIc7mvxJn
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DDP Manager = "C:\\Program Files (x86)\\DDP Manager\\ddpmgr.exe" 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe -
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe -
Drops file in System32 directory 2 IoCs
Processes:
svchost.exedescription ioc process File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{EC067379-06F4-41D4-BD67-0D701900F1C0}.catalogItem svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\Microsoft\InstallService\{784C52DE-7E56-49AF-A678-1A452F54B024}.catalogItem svchost.exe -
Drops file in Program Files directory 2 IoCs
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exedescription ioc process File created C:\Program Files (x86)\DDP Manager\ddpmgr.exe 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe File opened for modification C:\Program Files (x86)\DDP Manager\ddpmgr.exe 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString svchost.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2352 schtasks.exe 4376 schtasks.exe -
Enumerates system info in registry 2 TTPs 2 IoCs
Processes:
svchost.exedescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS svchost.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU svchost.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exepid process 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exepid process 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exedescription pid process Token: SeDebugPrivilege 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe Token: SeDebugPrivilege 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exedescription pid process target process PID 2876 wrote to memory of 2352 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe schtasks.exe PID 2876 wrote to memory of 2352 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe schtasks.exe PID 2876 wrote to memory of 2352 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe schtasks.exe PID 2876 wrote to memory of 4376 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe schtasks.exe PID 2876 wrote to memory of 4376 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe schtasks.exe PID 2876 wrote to memory of 4376 2876 0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe"C:\Users\Admin\AppData\Local\Temp\0145bcd3caff7f25d5fab6ab1f9fb9516ae0b47f3e3356852757644570eeca8d.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmp276E.tmp"2⤵
- Creates scheduled task(s)
PID:2352 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DDP Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp2A6C.tmp"2⤵
- Creates scheduled task(s)
PID:4376
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p1⤵
- Drops file in System32 directory
- Checks processor information in registry
- Enumerates system info in registry
PID:3944
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5d6b7f5b10b176f52db21f5529fe867bd
SHA1c2fb36621c6922487869be99687455edd86e967c
SHA2568472d649110c687adca5b3c5eb5ec88619e23138629d26e4c173d076f94f3e88
SHA51257e51e8460d696c84ca00352dc58eab83ba91e7c3b03168fd18823999499fa7ecae10055ebbc9f39f51c40298c65bb32b9ff06c227764c93562810aa0a8baf4e
-
Filesize
1KB
MD5677848190631e19222304d1982aa2e1b
SHA1bed6cf97d3458e4ea59ff9823375d915a9b3d682
SHA2568bcf16c788d228932fa707bb4250c05151e099bdf7040adc717e53680601be3d
SHA512f5d41e150011bc63f4c95799e21fe91ffaa25eb05f4ca46ea89f3a3ca5325413ba4e0b7b5d69c0bc189955f3308c4928016a7cc1d6f7c2352639106952e92b1e