Analysis
-
max time kernel
152s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
01/12/2022, 20:40
Static task
static1
Behavioral task
behavioral1
Sample
9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe
Resource
win7-20221111-en
Behavioral task
behavioral2
Sample
9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe
Resource
win10v2004-20220812-en
General
-
Target
9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe
-
Size
362KB
-
MD5
cd8fe619d7599207aca53f10348cfb83
-
SHA1
344c231e4e6ddb37565951234ed64db4e71f6c6b
-
SHA256
9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354
-
SHA512
7a7625316b2387f659b417bb525093b47058b2cf2b108678bc62ad154a4ab887771641745bae03c9292acb57c3ebff6ae3ed4e17868e4f9b37a7672b907aa81c
-
SSDEEP
6144:H7UU2Ffp6gBmmJQaK6HcprAga+13pFjlGLa9z/Z0nL1uk4QMHYt5fH:H7U36mvmrAIpXGkI4Q6Yt5v
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 4628 svcupdater.exe 3484 svcupdater.exe 3008 svcupdater.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4740 set thread context of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4628 set thread context of 3484 4628 svcupdater.exe 94 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2124 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 4628 svcupdater.exe 4628 svcupdater.exe 4628 svcupdater.exe 4628 svcupdater.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeDebugPrivilege 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe Token: SeDebugPrivilege 2420 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe Token: SeDebugPrivilege 4628 svcupdater.exe Token: SeDebugPrivilege 3484 svcupdater.exe Token: SeDebugPrivilege 3008 svcupdater.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 4740 wrote to memory of 2420 4740 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 82 PID 2420 wrote to memory of 1576 2420 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 90 PID 2420 wrote to memory of 1576 2420 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 90 PID 2420 wrote to memory of 1576 2420 9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe 90 PID 1576 wrote to memory of 2124 1576 cmd.exe 92 PID 1576 wrote to memory of 2124 1576 cmd.exe 92 PID 1576 wrote to memory of 2124 1576 cmd.exe 92 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94 PID 4628 wrote to memory of 3484 4628 svcupdater.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe"C:\Users\Admin\AppData\Local\Temp\9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4740 -
C:\Users\Admin\AppData\Local\Temp\9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe"C:\Users\Admin\AppData\Local\Temp\9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2420 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /tn \cIVjqALJut /tr "C:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:1576 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \cIVjqALJut /tr "C:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Creates scheduled task(s)
PID:2124
-
-
-
-
C:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exeC:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exe1⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exe"C:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exe"2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3484
-
-
C:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exeC:\Users\Admin\AppData\Roaming\cIVjqALJut\svcupdater.exe1⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:3008
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\9b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354.exe.log
Filesize1KB
MD59a2d0ce437d2445330f2646472703087
SHA133c83e484a15f35c2caa3af62d5da6b7713a20ae
SHA25630ea2f716e85f8d14a201e3fb0897d745a01b113342dfb7a9b7ac133c4ef150c
SHA512a61d18d90bfad9ea8afdfa37537cfea3d5a3d0c161e323fa65840c283bdc87c3de85daaff5519beea2f2719eec1c68398eea8679b55ff733a61052f073162d5d
-
Filesize
1KB
MD59a2d0ce437d2445330f2646472703087
SHA133c83e484a15f35c2caa3af62d5da6b7713a20ae
SHA25630ea2f716e85f8d14a201e3fb0897d745a01b113342dfb7a9b7ac133c4ef150c
SHA512a61d18d90bfad9ea8afdfa37537cfea3d5a3d0c161e323fa65840c283bdc87c3de85daaff5519beea2f2719eec1c68398eea8679b55ff733a61052f073162d5d
-
Filesize
362KB
MD5cd8fe619d7599207aca53f10348cfb83
SHA1344c231e4e6ddb37565951234ed64db4e71f6c6b
SHA2569b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354
SHA5127a7625316b2387f659b417bb525093b47058b2cf2b108678bc62ad154a4ab887771641745bae03c9292acb57c3ebff6ae3ed4e17868e4f9b37a7672b907aa81c
-
Filesize
362KB
MD5cd8fe619d7599207aca53f10348cfb83
SHA1344c231e4e6ddb37565951234ed64db4e71f6c6b
SHA2569b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354
SHA5127a7625316b2387f659b417bb525093b47058b2cf2b108678bc62ad154a4ab887771641745bae03c9292acb57c3ebff6ae3ed4e17868e4f9b37a7672b907aa81c
-
Filesize
362KB
MD5cd8fe619d7599207aca53f10348cfb83
SHA1344c231e4e6ddb37565951234ed64db4e71f6c6b
SHA2569b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354
SHA5127a7625316b2387f659b417bb525093b47058b2cf2b108678bc62ad154a4ab887771641745bae03c9292acb57c3ebff6ae3ed4e17868e4f9b37a7672b907aa81c
-
Filesize
362KB
MD5cd8fe619d7599207aca53f10348cfb83
SHA1344c231e4e6ddb37565951234ed64db4e71f6c6b
SHA2569b46704e3343d6dfde4d53500bffeba23aebff63a42bf96016b8114ba5f79354
SHA5127a7625316b2387f659b417bb525093b47058b2cf2b108678bc62ad154a4ab887771641745bae03c9292acb57c3ebff6ae3ed4e17868e4f9b37a7672b907aa81c