Analysis
-
max time kernel
78s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
15-11-2022 04:10
Static task
static1
Behavioral task
behavioral1
Sample
39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exe
Resource
win10v2004-20220901-en
General
-
Target
39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exe
-
Size
6.1MB
-
MD5
4475d543fd30e39295790f0f766dfcd7
-
SHA1
bd9b5b090c3c3c86be2c4e7fbe587918c2be4ef8
-
SHA256
39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398
-
SHA512
55d292cd3ae08ff96981ded66828c333783bce2775c4581826be564211df500fa08474990c675ea145eb2702833e618b06038e7594d343234b4bdfb4b8983a7b
-
SSDEEP
98304:fO/zQnFA/Cv9sATR/yl9zqE4C5J+daIhtoO9Ekm6tGEvZb:f8Q62CATR/yl9+ErefXB636I8
Malware Config
Signatures
-
Modifies file permissions 1 TTPs 3 IoCs
Processes:
icacls.exeicacls.exeicacls.exepid process 1932 icacls.exe 908 icacls.exe 1568 icacls.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
Processes:
39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exepid process 1824 39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exe"C:\Users\Admin\AppData\Local\Temp\39d3df8f4a3bacaf1456712177c36f4fd76acf69a174c74927c15442bc80a398.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "Windows\IntelComputingToolkit\IntelGAS8.2.2.9." /TR "C:\ProgramData\lntelToolSkits\IntelGAS-Ver8.2.2.9.exe" /SC MINUTE2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\lntelToolSkits" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\lntelToolSkits" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"2⤵
- Modifies file permissions
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\lntelToolSkits" /inheritance:e /deny "adMnepoxyFEYWGOLmin:(R,REA,RA,RD)"2⤵
- Modifies file permissions
-
C:\Windows\system32\taskeng.exetaskeng.exe {28268890-7B01-486A-8D8B-8B6655563BD2} S-1-5-21-2292972927-2705560509-2768824231-1000:GRXNNIIE\Admin:Interactive:[1]1⤵
-
C:\ProgramData\lntelToolSkits\IntelGAS-Ver8.2.2.9.exeC:\ProgramData\lntelToolSkits\IntelGAS-Ver8.2.2.9.exe2⤵
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\lntelToolSkits\IntelGAS-Ver8.2.2.9.exeFilesize
1015.5MB
MD51d5280fa43b09bcd0aed68c19c77b7aa
SHA161881e90f4a77b133e2708f8210306d533d7c6ff
SHA2567030d5905b572391ca144361b8901f7989ce8fd842da6d3ee6e71e6e9e255432
SHA512c00a13399c2116cab152703b97bc616c33c75f593f1b9b75f30fc7a409af1aa99df9b00f4d7aa2eed6106db08a5907586f05b65aeed5caeece4828f65bacf5b0
-
C:\ProgramData\lntelToolSkits\IntelGAS-Ver8.2.2.9.exeFilesize
987.9MB
MD52086b59730d1ebfda026bda83ee211dc
SHA16e0430c2ffd441b3cd7c9408181bef299b3288a9
SHA25652a4cd5a8116127b20d309c193ffe2fcfb257fcded7506180babcfbb8641bd0c
SHA5128f1493e1fac7eb04ac8821d90e2c502db7a7a5e81d7ddafdac51644f4c10465bf88aff82ad108d6e20fdca1fdd0172deb1ec844deab34ad42542668b5f77c6b2
-
memory/844-66-0x0000000000000000-mapping.dmp
-
memory/908-63-0x0000000000000000-mapping.dmp
-
memory/1568-64-0x0000000000000000-mapping.dmp
-
memory/1824-54-0x0000000075571000-0x0000000075573000-memory.dmpFilesize
8KB
-
memory/1824-55-0x0000000000400000-0x0000000000DA3000-memory.dmpFilesize
9.6MB
-
memory/1824-58-0x0000000000400000-0x0000000000DA3000-memory.dmpFilesize
9.6MB
-
memory/1824-59-0x0000000000400000-0x0000000000DA3000-memory.dmpFilesize
9.6MB
-
memory/1824-65-0x0000000000400000-0x0000000000DA3000-memory.dmpFilesize
9.6MB
-
memory/1932-61-0x0000000000000000-mapping.dmp
-
memory/1956-60-0x0000000000000000-mapping.dmp