Analysis
-
max time kernel
90s -
max time network
73s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
05/03/2023, 14:42
Static task
static1
Behavioral task
behavioral1
Sample
02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe
Resource
win10-20230220-en
General
-
Target
02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe
-
Size
4.2MB
-
MD5
5323d8060be46872b2c0a81c9c4bc67e
-
SHA1
71dd8df269585b21a7d0b7f2d1f7c0cf4195013f
-
SHA256
02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45
-
SHA512
5412d0a7e844c8980ca85a903157d5c1e77b767275ec518e533515d30f545952d77ff108933f3d968256153a4c21c74eafbe6267b102375ecc306eeb9a5b1f55
-
SSDEEP
98304:uEhTEG4s2Rk5cs38shhSNjJe+i4sYeq69DedTV0VbTXF2RAvRthQ:uRG4sskf38s7MjJeVYT69id+VbaM8
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2308 regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe 4896 regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4076 icacls.exe 4932 icacls.exe 1488 icacls.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4268 set thread context of 5104 4268 02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2640 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4268 wrote to memory of 5104 4268 02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe 67 PID 4268 wrote to memory of 5104 4268 02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe 67 PID 4268 wrote to memory of 5104 4268 02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe 67 PID 4268 wrote to memory of 5104 4268 02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe 67 PID 4268 wrote to memory of 5104 4268 02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe 67 PID 5104 wrote to memory of 4076 5104 AppLaunch.exe 68 PID 5104 wrote to memory of 4076 5104 AppLaunch.exe 68 PID 5104 wrote to memory of 4076 5104 AppLaunch.exe 68 PID 5104 wrote to memory of 4932 5104 AppLaunch.exe 70 PID 5104 wrote to memory of 4932 5104 AppLaunch.exe 70 PID 5104 wrote to memory of 4932 5104 AppLaunch.exe 70 PID 5104 wrote to memory of 1488 5104 AppLaunch.exe 72 PID 5104 wrote to memory of 1488 5104 AppLaunch.exe 72 PID 5104 wrote to memory of 1488 5104 AppLaunch.exe 72 PID 5104 wrote to memory of 2640 5104 AppLaunch.exe 74 PID 5104 wrote to memory of 2640 5104 AppLaunch.exe 74 PID 5104 wrote to memory of 2640 5104 AppLaunch.exe 74 PID 5104 wrote to memory of 2308 5104 AppLaunch.exe 76 PID 5104 wrote to memory of 2308 5104 AppLaunch.exe 76
Processes
-
C:\Users\Admin\AppData\Local\Temp\02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe"C:\Users\Admin\AppData\Local\Temp\02393da102f8a8c5d76eee171cb10f619114d07680905b17fe48bf5479355d45.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:5104 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4076
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4932
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1488
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1" /TR "C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:2640
-
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe"C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Executes dropped EXE
PID:2308
-
-
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exeC:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe1⤵
- Executes dropped EXE
PID:4896
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe
Filesize734.2MB
MD58c87370cf6ffd35393cf0b69e53f7bf5
SHA1d20a81a283eb3c843d63e3486e47a08e9b51494b
SHA2563f3fa0d4be5006768c84fe687b254ed2216d9605de5bd78f09241a64da3a0fd3
SHA5129fb75f686a9026644358eeb22b94c2172afe56899daf62adecb3a407abcbd3cadbe4deb350db23511450a8b92b896960fede29fa50ede95b9b04361534e538f4
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe
Filesize734.2MB
MD58c87370cf6ffd35393cf0b69e53f7bf5
SHA1d20a81a283eb3c843d63e3486e47a08e9b51494b
SHA2563f3fa0d4be5006768c84fe687b254ed2216d9605de5bd78f09241a64da3a0fd3
SHA5129fb75f686a9026644358eeb22b94c2172afe56899daf62adecb3a407abcbd3cadbe4deb350db23511450a8b92b896960fede29fa50ede95b9b04361534e538f4
-
C:\ProgramData\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1\regid.1991-06.com.microsoftMicrosoft-type5.2.3.1.exe
Filesize538.7MB
MD55c5aff67311e5fda3c4105ec1933336b
SHA100538662904fd9858a8e8abd3a9b2e706a628749
SHA2562b2ea3a8ef5925af43eaabce2d782fe1397f55e37af59c014ceafb564a4d494d
SHA512b4e82e38be34780d91467a0763a84daaf36cf03961a9b326f7ce42109eb5c798da123eb105a1a2eb86d70b0761a0f449031aeeee8af70a3ed8f202637b202c29