Analysis
-
max time kernel
144s -
max time network
179s -
platform
windows10-1703_x64 -
resource
win10-20220812-en -
resource tags
arch:x64arch:x86image:win10-20220812-enlocale:en-usos:windows10-1703-x64system -
submitted
24-11-2022 14:09
Static task
static1
Behavioral task
behavioral1
Sample
f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe
Resource
win10-20220812-en
General
-
Target
f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe
-
Size
375KB
-
MD5
83ccb5c523ac9743f9db41460fe8fcd2
-
SHA1
25b4f65c963cf5c8ddd5e283e337be74d394768c
-
SHA256
f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
-
SHA512
8e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99
-
SSDEEP
6144:rvrQtqccMhb9VxU/aido6WXjQ0WU7+OLBOZYJmQs+gvUUudBfa4AtzqJVHnqRkY4:7cEcc69VixU7+OUZYsmAUUui4azq+iv9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 4760 asg.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 2 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\SubDir\asg.exe f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe File opened for modification C:\Windows\SysWOW64\SubDir\asg.exe f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe File opened for modification C:\Windows\SysWOW64\SubDir\asg.exe asg.exe File opened for modification C:\Windows\SysWOW64\SubDir asg.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4180 schtasks.exe 2744 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4200 f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe Token: SeDebugPrivilege 4760 asg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4760 asg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 4200 wrote to memory of 4180 4200 f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe 67 PID 4200 wrote to memory of 4180 4200 f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe 67 PID 4200 wrote to memory of 4760 4200 f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe 69 PID 4200 wrote to memory of 4760 4200 f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe 69 PID 4760 wrote to memory of 2744 4760 asg.exe 70 PID 4760 wrote to memory of 2744 4760 asg.exe 70
Processes
-
C:\Users\Admin\AppData\Local\Temp\f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe"C:\Users\Admin\AppData\Local\Temp\f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4200 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:4180
-
-
C:\Windows\SysWOW64\SubDir\asg.exe"C:\Windows\SysWOW64\SubDir\asg.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4760 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\asg.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:2744
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD583ccb5c523ac9743f9db41460fe8fcd2
SHA125b4f65c963cf5c8ddd5e283e337be74d394768c
SHA256f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
SHA5128e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99
-
Filesize
375KB
MD583ccb5c523ac9743f9db41460fe8fcd2
SHA125b4f65c963cf5c8ddd5e283e337be74d394768c
SHA256f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
SHA5128e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99