Analysis
-
max time kernel
148s -
max time network
123s -
platform
windows10-2004_x64 -
resource
win10v2004-20220901-en -
resource tags
arch:x64arch:x86image:win10v2004-20220901-enlocale:en-usos:windows10-2004-x64system -
submitted
27-11-2022 17:58
Behavioral task
behavioral1
Sample
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe
Resource
win7-20221111-en
General
-
Target
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe
-
Size
477KB
-
MD5
4ad2e0d9c97300512ffb3df74def6147
-
SHA1
30c9e809e4dbdafdee2fe31c7a90cb2abf8cdd1c
-
SHA256
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650
-
SHA512
30d8ca723afbf09d3b8aca7279069eb99fdc1b6c83c33b8a5234007e88dd9c5718baa43656e8edf6e3919e905ba32fac41f04c43a65778df553a6ef35064b4a5
-
SSDEEP
12288:HtsDO4UA8pVq0Phbp9A5qwyAdG1udwG7UeYC0g:Ar8pVtPhb8qtaG1awSUq0g
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\DHCP Subsystem = "C:\\Program Files (x86)\\DHCP Subsystem\\dhcpss.exe" ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Drops file in Program Files directory 2 IoCs
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exedescription ioc process File created C:\Program Files (x86)\DHCP Subsystem\dhcpss.exe ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe File opened for modification C:\Program Files (x86)\DHCP Subsystem\dhcpss.exe ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 3288 schtasks.exe 1952 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 6 IoCs
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exepid process 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exepid process 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exedescription pid process Token: SeDebugPrivilege 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe Token: SeDebugPrivilege 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exedescription pid process target process PID 4572 wrote to memory of 3288 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe schtasks.exe PID 4572 wrote to memory of 3288 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe schtasks.exe PID 4572 wrote to memory of 3288 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe schtasks.exe PID 4572 wrote to memory of 1952 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe schtasks.exe PID 4572 wrote to memory of 1952 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe schtasks.exe PID 4572 wrote to memory of 1952 4572 ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe"C:\Users\Admin\AppData\Local\Temp\ae698ada405d34d610d2941262c92460d1464353f2173c8f39905a268d31e650.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Subsystem" /xml "C:\Users\Admin\AppData\Local\Temp\tmpC374.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "DHCP Subsystem Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpD557.tmp"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpC374.tmpFilesize
1KB
MD55b682d3b020ca6493c8356009c992b6a
SHA14256c489428bca4811a7cc1d613ace5b90d786e0
SHA25644b8ba1bbe780de464fd86ccad3e20e389f71eaa9fa724cfbe1850126a2fb910
SHA512c2ae4a49719ef057f574f8d2ca6ef0f604b662667fd9cf19b4ec500fb86c5805359bebbe22bf6dc124b7aa492020fea4508db610baff41018aa3b9a84524a0f5
-
C:\Users\Admin\AppData\Local\Temp\tmpD557.tmpFilesize
1KB
MD52f26d92c1eeead3896820e56ec46f6f1
SHA1d95533b61eed7d89e4ada56bc566d60e42ac1f61
SHA25699a158463ce40c750bad6991ae1fceece305a0dbf8e209dd7147b5d539756bfa
SHA5126c1ed12d5e1afcd9e7f327e0153786fd8594f75a995f341c408ef014e69917452a9fe99c511f0249aceb57b3045b707f1fd3f404e4086cfbf0aadcb3318db892
-
memory/1952-135-0x0000000000000000-mapping.dmp
-
memory/3288-133-0x0000000000000000-mapping.dmp
-
memory/4572-132-0x0000000075320000-0x00000000758D1000-memory.dmpFilesize
5.7MB
-
memory/4572-137-0x0000000075320000-0x00000000758D1000-memory.dmpFilesize
5.7MB