Analysis
-
max time kernel
40s -
max time network
43s -
platform
windows7_x64 -
resource
win7-20220812-en -
resource tags
arch:x64arch:x86image:win7-20220812-enlocale:en-usos:windows7-x64system -
submitted
22/12/2022, 22:31
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20220812-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20220812-en
General
-
Target
file.exe
-
Size
1.8MB
-
MD5
3851198c19403276c3f04fa1d7987ac3
-
SHA1
d23dbfeebb6c541714b4fd1058bc642bee528975
-
SHA256
2a7c62fb5cfcb03fa3b5174ab6a68f2b2f0e7391f20d58b07a48bd9c4d224921
-
SHA512
e0b4d8ce7ac38916a651ac0add90a3ad541ee483c71bc7d387bdc7816a7dc141c1f566a84100d9f643285bc9a6d5e3679ffc8dbb13bd53b34ade4e6ac8cbffe5
-
SSDEEP
24576:RtVSn52pAf2rDNtl2aCHXdLSuhMyvLvwzKLqKy+f81TcOCDThWD6ibINLbSB/irs:tSn52KNWKLqFBFMhaxbaLuBKrs
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1128 AVPTQBAEW.exe -
Loads dropped DLL 1 IoCs
pid Process 1724 cmd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 836 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 668 timeout.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1740 powershell.exe 2008 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 1516 file.exe Token: SeDebugPrivilege 1740 powershell.exe Token: SeDebugPrivilege 1128 AVPTQBAEW.exe Token: SeDebugPrivilege 2008 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 1516 wrote to memory of 1740 1516 file.exe 27 PID 1516 wrote to memory of 1740 1516 file.exe 27 PID 1516 wrote to memory of 1740 1516 file.exe 27 PID 1516 wrote to memory of 1724 1516 file.exe 29 PID 1516 wrote to memory of 1724 1516 file.exe 29 PID 1516 wrote to memory of 1724 1516 file.exe 29 PID 1724 wrote to memory of 668 1724 cmd.exe 30 PID 1724 wrote to memory of 668 1724 cmd.exe 30 PID 1724 wrote to memory of 668 1724 cmd.exe 30 PID 1724 wrote to memory of 1128 1724 cmd.exe 32 PID 1724 wrote to memory of 1128 1724 cmd.exe 32 PID 1724 wrote to memory of 1128 1724 cmd.exe 32 PID 1128 wrote to memory of 2008 1128 AVPTQBAEW.exe 34 PID 1128 wrote to memory of 2008 1128 AVPTQBAEW.exe 34 PID 1128 wrote to memory of 2008 1128 AVPTQBAEW.exe 34 PID 1128 wrote to memory of 824 1128 AVPTQBAEW.exe 35 PID 1128 wrote to memory of 824 1128 AVPTQBAEW.exe 35 PID 1128 wrote to memory of 824 1128 AVPTQBAEW.exe 35 PID 824 wrote to memory of 836 824 cmd.exe 37 PID 824 wrote to memory of 836 824 cmd.exe 37 PID 824 wrote to memory of 836 824 cmd.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp3B4D.tmp.bat""2⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:668
-
-
C:\ProgramData\WindowsMail\AVPTQBAEW.exe"C:\ProgramData\WindowsMail\AVPTQBAEW.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1128 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2008
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "AVPTQBAEW" /tr "C:\ProgramData\WindowsMail\AVPTQBAEW.exe"4⤵
- Suspicious use of WriteProcessMemory
PID:824 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "AVPTQBAEW" /tr "C:\ProgramData\WindowsMail\AVPTQBAEW.exe"5⤵
- Creates scheduled task(s)
PID:836
-
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.8MB
MD53851198c19403276c3f04fa1d7987ac3
SHA1d23dbfeebb6c541714b4fd1058bc642bee528975
SHA2562a7c62fb5cfcb03fa3b5174ab6a68f2b2f0e7391f20d58b07a48bd9c4d224921
SHA512e0b4d8ce7ac38916a651ac0add90a3ad541ee483c71bc7d387bdc7816a7dc141c1f566a84100d9f643285bc9a6d5e3679ffc8dbb13bd53b34ade4e6ac8cbffe5
-
Filesize
1.8MB
MD53851198c19403276c3f04fa1d7987ac3
SHA1d23dbfeebb6c541714b4fd1058bc642bee528975
SHA2562a7c62fb5cfcb03fa3b5174ab6a68f2b2f0e7391f20d58b07a48bd9c4d224921
SHA512e0b4d8ce7ac38916a651ac0add90a3ad541ee483c71bc7d387bdc7816a7dc141c1f566a84100d9f643285bc9a6d5e3679ffc8dbb13bd53b34ade4e6ac8cbffe5
-
Filesize
149B
MD55221191514c425b6b6b959ffa82e2b07
SHA1e2fe216efaa100e357e3cee1b34a6229e0b57a3e
SHA25689b1039905489ceb831045f0124816d97532579e98d8133e6b890688200cfcbc
SHA512bec94106dc2ea11b04cc22f477e85684223a6f29dddbbe6474ec31439087e9535143dc1111ded9d05039a300913cec3a1d9e7685117d3c46eb9d74dcd7cc4be4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD598e4978a19a15f625f8e5f7e66d17954
SHA1105b226f34080a1e2a00f72e4ea45c7437b4483a
SHA2567b49b4c1d9382b728c74583861611bc41212a88458aab8b5495a441f3c6fd3ad
SHA512ac65b11adc701d9e76f6a57acfc0a0d05a3e8d5a458c685e1b1ceafd3ebac8ba6ebe34c0d1177a82995f32d3347e59940d4fe8efa54764beef68926e5a5462e9
-
Filesize
1.8MB
MD53851198c19403276c3f04fa1d7987ac3
SHA1d23dbfeebb6c541714b4fd1058bc642bee528975
SHA2562a7c62fb5cfcb03fa3b5174ab6a68f2b2f0e7391f20d58b07a48bd9c4d224921
SHA512e0b4d8ce7ac38916a651ac0add90a3ad541ee483c71bc7d387bdc7816a7dc141c1f566a84100d9f643285bc9a6d5e3679ffc8dbb13bd53b34ade4e6ac8cbffe5