Analysis
-
max time kernel
384s -
max time network
474s -
platform
windows10-2004_x64 -
resource
win10v2004-20221111-en -
resource tags
arch:x64arch:x86image:win10v2004-20221111-enlocale:en-usos:windows10-2004-x64system -
submitted
26-11-2022 16:34
Static task
static1
Behavioral task
behavioral1
Sample
46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe
Resource
win10v2004-20221111-en
General
-
Target
46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe
-
Size
6KB
-
MD5
cca0a2bfb06bd6f34084d7b3252210c8
-
SHA1
a5c1616a568659d0e0fbf78f55538bae818c7867
-
SHA256
46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4
-
SHA512
eb80b39a28edd834b3f9a62c62106a1e7e130f45cd25c844c9dc345fcd67358a6ff95b08e7b2c03bd6bb62a7193f62a43a29d35ea52438ed7dcf424071a94a04
-
SSDEEP
96:u9+15vXfuPvmUPg8OCJ1tolwHZDAkiIQsfOLMAdPEcVfknTNbUrV1aTap:GGP2rg8W2ZDr4MuEc1gap
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
Processes:
taskmgr.exepid process 4532 taskmgr.exe -
Drops file in Program Files directory 3 IoCs
Processes:
46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exetaskmgr.exedescription ioc process File created C:\Program Files\Windows NT\Accessories\taskmgr.exe 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe File opened for modification C:\Program Files\Windows NT\Accessories\taskmgr.exe 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe File opened for modification C:\Program Files\Windows NT\Accessories\mswrd4.wpc taskmgr.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
taskmgr.exe46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exedescription pid process Token: SeIncBasePriorityPrivilege 4532 taskmgr.exe Token: SeDebugPrivilege 4532 taskmgr.exe Token: SeIncBasePriorityPrivilege 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exedescription pid process target process PID 1984 wrote to memory of 4532 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe taskmgr.exe PID 1984 wrote to memory of 4532 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe taskmgr.exe PID 1984 wrote to memory of 4532 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe taskmgr.exe PID 1984 wrote to memory of 816 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe cmd.exe PID 1984 wrote to memory of 816 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe cmd.exe PID 1984 wrote to memory of 816 1984 46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe cmd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe"C:\Users\Admin\AppData\Local\Temp\46034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4.exe"1⤵
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files\Windows NT\Accessories\taskmgr.exe"C:\Program Files\Windows NT\Accessories\taskmgr.exe"2⤵
- Executes dropped EXE
- Drops file in Program Files directory
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\46034E~1.EXE > nul2⤵
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Program Files\Windows NT\Accessories\taskmgr.exeFilesize
6KB
MD5cca0a2bfb06bd6f34084d7b3252210c8
SHA1a5c1616a568659d0e0fbf78f55538bae818c7867
SHA25646034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4
SHA512eb80b39a28edd834b3f9a62c62106a1e7e130f45cd25c844c9dc345fcd67358a6ff95b08e7b2c03bd6bb62a7193f62a43a29d35ea52438ed7dcf424071a94a04
-
C:\Program Files\Windows NT\Accessories\taskmgr.exeFilesize
6KB
MD5cca0a2bfb06bd6f34084d7b3252210c8
SHA1a5c1616a568659d0e0fbf78f55538bae818c7867
SHA25646034e7cd85d8ce2c9e0d15d6719287b0bf021c491217fff3637da76347529a4
SHA512eb80b39a28edd834b3f9a62c62106a1e7e130f45cd25c844c9dc345fcd67358a6ff95b08e7b2c03bd6bb62a7193f62a43a29d35ea52438ed7dcf424071a94a04
-
memory/816-135-0x0000000000000000-mapping.dmp
-
memory/4532-132-0x0000000000000000-mapping.dmp