Analysis
-
max time kernel
146s -
max time network
65s -
platform
windows7_x64 -
resource
win7-20221111-en -
resource tags
arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system -
submitted
27/11/2022, 17:58
Behavioral task
behavioral1
Sample
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe
Resource
win7-20221111-en
General
-
Target
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe
-
Size
477KB
-
MD5
4ad2e0d9c97300512ffb3df74def6147
-
SHA1
30c9e809e4dbdafdee2fe31c7a90cb2abf8cdd1c
-
SHA256
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650
-
SHA512
30d8ca723afbf09d3b8aca7279069eb99fdc1b6c83c33b8a5234007e88dd9c5718baa43656e8edf6e3919e905ba32fac41f04c43a65778df553a6ef35064b4a5
-
SSDEEP
12288:HtsDO4UA8pVq0Phbp9A5qwyAdG1udwG7UeYC0g:Ar8pVtPhb8qtaG1awSUq0g
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\ISS Manager = "C:\\Program Files (x86)\\ISS Manager\\issmgr.exe" ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\ISS Manager\issmgr.exe ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe File opened for modification C:\Program Files (x86)\ISS Manager\issmgr.exe ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2012 schtasks.exe 1424 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
pid Process 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe Token: SeDebugPrivilege 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 1220 wrote to memory of 2012 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 28 PID 1220 wrote to memory of 2012 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 28 PID 1220 wrote to memory of 2012 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 28 PID 1220 wrote to memory of 2012 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 28 PID 1220 wrote to memory of 1424 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 30 PID 1220 wrote to memory of 1424 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 30 PID 1220 wrote to memory of 1424 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 30 PID 1220 wrote to memory of 1424 1220 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe"C:\Users\Admin\AppData\Local\Temp\ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "ISS Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmp1E5B.tmp"2⤵
- Creates scheduled task(s)
PID:2012
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "ISS Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp510F.tmp"2⤵
- Creates scheduled task(s)
PID:1424
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD55b682d3b020ca6493c8356009c992b6a
SHA14256c489428bca4811a7cc1d613ace5b90d786e0
SHA25644b8ba1bbe780de464fd86ccad3e20e389f71eaa9fa724cfbe1850126a2fb910
SHA512c2ae4a49719ef057f574f8d2ca6ef0f604b662667fd9cf19b4ec500fb86c5805359bebbe22bf6dc124b7aa492020fea4508db610baff41018aa3b9a84524a0f5