Analysis

  • max time kernel
    52s
  • max time network
    46s
  • platform
    windows7_x64
  • resource
    win7-20220812-en
  • resource tags

    arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system
  • submitted
    03-11-2022 15:23

General

  • Target

    2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe

  • Size

    9.6MB

  • MD5

    699bdbd2b656d80d8e8a467025536d52

  • SHA1

    cb4a2a7f3b39fc41ce0d935e7851117422364c76

  • SHA256

    2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b

  • SHA512

    0589ad9ee15411f5de41ef6570515b0b320a3cae040e70f94bb56ecb85292be561ac05f37891fe913c26045ac5058118daa7f3c66681458ecb693bdbfb65758f

  • SSDEEP

    196608:mZNNPxSRvMx1GffQf0DQR3FkiUzD30xs7LpLJwN7aIH/avHwjwh2FrfX6:mZN17GffEJRSiUfZXptOWq/3s2FX

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Possible privilege escalation attempt 4 IoCs
  • Loads dropped DLL 4 IoCs
  • Modifies file permissions 1 TTPs 4 IoCs
  • Drops file in Windows directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 2 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 50 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe
    "C:\Users\Admin\AppData\Local\Temp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of WriteProcessMemory
    PID:1096
    • C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp
      "C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp" /SL5="$60122,9284365,180224,C:\Users\Admin\AppData\Local\Temp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Windows directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\system32\takeown.exe
        "C:\Windows\system32\takeown.exe" /f C:\DRIVERS /a /r /d y
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:940
      • C:\Windows\system32\icacls.exe
        "C:\Windows\system32\icacls.exe" C:\DRIVERS /reset /T /C /L /Q
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:2012
      • C:\Windows\system32\icacls.exe
        "C:\Windows\system32\icacls.exe" C:\DRIVERS /inheritance:e /grant:r *S-1-5-32-544:(OI)(CI)F *S-1-5-18:(OI)(CI)F *S-1-5-32-545:(OI)(CI)RX /T /C /L /Q
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1304
      • C:\Windows\system32\icacls.exe
        "C:\Windows\system32\icacls.exe" C:\DRIVERS /inheritance:r /C /L /Q
        3⤵
        • Possible privilege escalation attempt
        • Modifies file permissions
        PID:1728
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /CREATE /XML C:\DRIVERS\WIN\ME\20220311.16243571\DeleteFolder.xml /TN "\LenovoCleanupFolder-20220311.162452"
        3⤵
        • Creates scheduled task(s)
        PID:1776
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /CHANGE /TN "\LenovoCleanupFolder-20220311.162452" /TR "C:\Windows\system32\cmd.exe /C 'rd /s /q C:\DRIVERS\WIN\ME\20220311.16243571\"
        3⤵
          PID:1884
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /CREATE /XML C:\DRIVERS\WIN\ME\20220311.16243571\DeleteTasks.xml /TN "\LenovoCleanupTasks-20220311.162452"
          3⤵
          • Creates scheduled task(s)
          PID:1196
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /CHANGE /TN "\LenovoCleanupTasks-20220311.162452" /TR "C:\Windows\system32\cmd.exe /C 'C:\Windows\system32\schtasks.exe /Delete /TN LenovoCleanupFolder-20220311.162452 /F && C:\Windows\system32\schtasks.exe /Delete /TN LenovoCleanupTasks-20220311.162452 /F'"
          3⤵
            PID:428
          • C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe
            "C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe"
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of WriteProcessMemory
            PID:1348
            • C:\DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exe
              "MEInfoWin64.exe" -fwsts
              4⤵
              • Executes dropped EXE
              PID:1496

      Network

      MITRE ATT&CK Matrix ATT&CK v6

      Execution

      Scheduled Task

      1
      T1053

      Persistence

      Scheduled Task

      1
      T1053

      Privilege Escalation

      Scheduled Task

      1
      T1053

      Defense Evasion

      File Permissions Modification

      1
      T1222

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\DRIVERS\WIN\ME\20220311.16243571\Config.ini
        Filesize

        374B

        MD5

        473bf74fab173e3612c44f05e376dda7

        SHA1

        e9974bed8f7b07d3679ca4cef4b9ef5021eb44b3

        SHA256

        c39d95bb3ed078feffa8cada92f84572dfd8931fd76dcf6b39b8a87bb6fd408a

        SHA512

        691818c54ca5e4457755561bac543b67e7e50ef81eb5a940679324c67a93de78c4764585bfafc35a91875e3f4bd2eafb3154b0c37f636a790f7a3c3c9d4cad99

      • C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe
        Filesize

        49KB

        MD5

        5e1e1d2a8a7108c90fcea38b0dd27ddf

        SHA1

        2827ddd78f28e9831e59cbf4e2fa480ac0afd005

        SHA256

        02317c60bbd56833049628ffff62e7032b76127d8f7c74341f2d9d38ae8ff36d

        SHA512

        b5778f3bec038ee67ea93f80c4f60a9a83b1a1796a35af496ad15214f91e992ac631675933981d3f3c27665f131a8506f301d1da75a13abcc9076267eef496a6

      • C:\DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe
        Filesize

        49KB

        MD5

        5e1e1d2a8a7108c90fcea38b0dd27ddf

        SHA1

        2827ddd78f28e9831e59cbf4e2fa480ac0afd005

        SHA256

        02317c60bbd56833049628ffff62e7032b76127d8f7c74341f2d9d38ae8ff36d

        SHA512

        b5778f3bec038ee67ea93f80c4f60a9a83b1a1796a35af496ad15214f91e992ac631675933981d3f3c27665f131a8506f301d1da75a13abcc9076267eef496a6

      • C:\DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exe
        Filesize

        2.2MB

        MD5

        33a03b105494fefceb9822adacb280b6

        SHA1

        8d44c5ea16ee6ab00d6530afb89d34d5bc22f705

        SHA256

        63989958c18265078f585bdbdb3d3b99765ec61ac7e3aa576883d97db3d35257

        SHA512

        42a8591166fdf21cab13d11c87a68a0a16829de143814347deb55b24dbaa03409f74a1f837e04aa8ce9ab568c89d009d88f124e76416f39d8d5ebd1843fb12c8

      • C:\Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp
        Filesize

        2.8MB

        MD5

        5874ed6c6fdc30e613302986486f606f

        SHA1

        5347de369a045ba5c8e3bedc3a87a370cf2cff7b

        SHA256

        5afa900bdf179f05d50930e2a299cfffccec93d2a3dfb4e203910c2dddbeb846

        SHA512

        adfdabf349b8aef5b55526a564ac1352c44cec2121a075c8d24fb5a4971383dd0a04ad83b47a0979c322a458dc75e0fac35b25a7309fb12df1ade33db012a6b5

      • \DRIVERS\WIN\ME\20220311.16243571\FWCapUpdate_v42.exe
        Filesize

        49KB

        MD5

        5e1e1d2a8a7108c90fcea38b0dd27ddf

        SHA1

        2827ddd78f28e9831e59cbf4e2fa480ac0afd005

        SHA256

        02317c60bbd56833049628ffff62e7032b76127d8f7c74341f2d9d38ae8ff36d

        SHA512

        b5778f3bec038ee67ea93f80c4f60a9a83b1a1796a35af496ad15214f91e992ac631675933981d3f3c27665f131a8506f301d1da75a13abcc9076267eef496a6

      • \DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exe
        Filesize

        2.2MB

        MD5

        33a03b105494fefceb9822adacb280b6

        SHA1

        8d44c5ea16ee6ab00d6530afb89d34d5bc22f705

        SHA256

        63989958c18265078f585bdbdb3d3b99765ec61ac7e3aa576883d97db3d35257

        SHA512

        42a8591166fdf21cab13d11c87a68a0a16829de143814347deb55b24dbaa03409f74a1f837e04aa8ce9ab568c89d009d88f124e76416f39d8d5ebd1843fb12c8

      • \DRIVERS\WIN\ME\20220311.16243571\MEInfoWin64.exe
        Filesize

        2.2MB

        MD5

        33a03b105494fefceb9822adacb280b6

        SHA1

        8d44c5ea16ee6ab00d6530afb89d34d5bc22f705

        SHA256

        63989958c18265078f585bdbdb3d3b99765ec61ac7e3aa576883d97db3d35257

        SHA512

        42a8591166fdf21cab13d11c87a68a0a16829de143814347deb55b24dbaa03409f74a1f837e04aa8ce9ab568c89d009d88f124e76416f39d8d5ebd1843fb12c8

      • \Windows\TempInst\is-JMQTR.tmp\2da0f43e59c603b946f4e03c2cd44ad85de9e8df9b3d0cc8af166edcb5ba057b.tmp
        Filesize

        2.8MB

        MD5

        5874ed6c6fdc30e613302986486f606f

        SHA1

        5347de369a045ba5c8e3bedc3a87a370cf2cff7b

        SHA256

        5afa900bdf179f05d50930e2a299cfffccec93d2a3dfb4e203910c2dddbeb846

        SHA512

        adfdabf349b8aef5b55526a564ac1352c44cec2121a075c8d24fb5a4971383dd0a04ad83b47a0979c322a458dc75e0fac35b25a7309fb12df1ade33db012a6b5

      • memory/428-70-0x0000000000000000-mapping.dmp
      • memory/848-66-0x0000000074D81000-0x0000000074D83000-memory.dmp
        Filesize

        8KB

      • memory/848-58-0x0000000000000000-mapping.dmp
      • memory/940-62-0x0000000000000000-mapping.dmp
      • memory/1096-84-0x0000000000400000-0x0000000000439000-memory.dmp
        Filesize

        228KB

      • memory/1096-54-0x0000000075ED1000-0x0000000075ED3000-memory.dmp
        Filesize

        8KB

      • memory/1096-61-0x0000000000400000-0x0000000000439000-memory.dmp
        Filesize

        228KB

      • memory/1096-55-0x0000000000400000-0x0000000000439000-memory.dmp
        Filesize

        228KB

      • memory/1196-69-0x0000000000000000-mapping.dmp
      • memory/1304-64-0x0000000000000000-mapping.dmp
      • memory/1348-72-0x0000000000000000-mapping.dmp
      • memory/1348-75-0x0000000000970000-0x0000000000980000-memory.dmp
        Filesize

        64KB

      • memory/1348-82-0x0000000004E55000-0x0000000004E66000-memory.dmp
        Filesize

        68KB

      • memory/1348-83-0x0000000004E55000-0x0000000004E66000-memory.dmp
        Filesize

        68KB

      • memory/1496-79-0x0000000000000000-mapping.dmp
      • memory/1728-65-0x0000000000000000-mapping.dmp
      • memory/1776-67-0x0000000000000000-mapping.dmp
      • memory/1884-68-0x0000000000000000-mapping.dmp
      • memory/2012-63-0x0000000000000000-mapping.dmp