Analysis
-
max time kernel
94s -
max time network
74s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2023, 07:01
Static task
static1
Behavioral task
behavioral1
Sample
f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe
Resource
win10-20230220-en
General
-
Target
f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe
-
Size
4.2MB
-
MD5
9e7e95187b24e39e73625a7fb2b70440
-
SHA1
9a3cfd29be16528b61d0b7d0b1207b0aaaffe967
-
SHA256
f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980
-
SHA512
654c1b256fae4b7286be199032d3df45a4e644f22fbff1d3cf0304ad95e80f573143176d268ea49d7f9b36d22e171962776333b4feff25390cc1cb8fcf255b2c
-
SSDEEP
98304:mEhTEG4s2Rk5cs38shhSNjJe+i4sYeq69DedTV0VbTXF2RAvRthA:mRG4sskf38s7MjJeVYT69id+VbaMM
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 3136 OracleMicrosoft-type8.0.9.7.exe 3060 OracleMicrosoft-type8.0.9.7.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 2940 icacls.exe 3728 icacls.exe 1076 icacls.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 2268 set thread context of 2828 2268 f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe 67 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4188 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 2268 wrote to memory of 2828 2268 f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe 67 PID 2268 wrote to memory of 2828 2268 f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe 67 PID 2268 wrote to memory of 2828 2268 f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe 67 PID 2268 wrote to memory of 2828 2268 f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe 67 PID 2268 wrote to memory of 2828 2268 f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe 67 PID 2828 wrote to memory of 2940 2828 AppLaunch.exe 68 PID 2828 wrote to memory of 2940 2828 AppLaunch.exe 68 PID 2828 wrote to memory of 2940 2828 AppLaunch.exe 68 PID 2828 wrote to memory of 3728 2828 AppLaunch.exe 70 PID 2828 wrote to memory of 3728 2828 AppLaunch.exe 70 PID 2828 wrote to memory of 3728 2828 AppLaunch.exe 70 PID 2828 wrote to memory of 1076 2828 AppLaunch.exe 72 PID 2828 wrote to memory of 1076 2828 AppLaunch.exe 72 PID 2828 wrote to memory of 1076 2828 AppLaunch.exe 72 PID 2828 wrote to memory of 4188 2828 AppLaunch.exe 76 PID 2828 wrote to memory of 4188 2828 AppLaunch.exe 76 PID 2828 wrote to memory of 4188 2828 AppLaunch.exe 76 PID 2828 wrote to memory of 3136 2828 AppLaunch.exe 75 PID 2828 wrote to memory of 3136 2828 AppLaunch.exe 75
Processes
-
C:\Users\Admin\AppData\Local\Temp\f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe"C:\Users\Admin\AppData\Local\Temp\f554ae38ddb59ce3904deeaad5cda290f0e5257d09f16650cc76d88ffa979980.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:2268 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\OracleMicrosoft-type8.0.9.7" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:2940
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\OracleMicrosoft-type8.0.9.7" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3728
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\OracleMicrosoft-type8.0.9.7" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1076
-
-
C:\ProgramData\OracleMicrosoft-type8.0.9.7\OracleMicrosoft-type8.0.9.7.exe"C:\ProgramData\OracleMicrosoft-type8.0.9.7\OracleMicrosoft-type8.0.9.7.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Executes dropped EXE
PID:3136
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "OracleMicrosoft-type8.0.9.7\OracleMicrosoft-type8.0.9.7" /TR "C:\ProgramData\OracleMicrosoft-type8.0.9.7\OracleMicrosoft-type8.0.9.7.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4188
-
-
-
C:\ProgramData\OracleMicrosoft-type8.0.9.7\OracleMicrosoft-type8.0.9.7.exeC:\ProgramData\OracleMicrosoft-type8.0.9.7\OracleMicrosoft-type8.0.9.7.exe1⤵
- Executes dropped EXE
PID:3060
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
764.9MB
MD53f5f0419b73d0a046546abdf371b3bc4
SHA175a7251755d57579038bb51e256c24d742147def
SHA256d9a90d8f87c76ff854e6f4edbdf2d9663078ce6edda9629c76a36a0fa79b089e
SHA51244a1756443dc782ec2a7685549fbde42375e51906da1b09d43fce1f2f6b5fccbc1e4d186cf3765776c70727a6558ebe4fa7c92577c15038eed05f1f2f3b39dac
-
Filesize
764.9MB
MD53f5f0419b73d0a046546abdf371b3bc4
SHA175a7251755d57579038bb51e256c24d742147def
SHA256d9a90d8f87c76ff854e6f4edbdf2d9663078ce6edda9629c76a36a0fa79b089e
SHA51244a1756443dc782ec2a7685549fbde42375e51906da1b09d43fce1f2f6b5fccbc1e4d186cf3765776c70727a6558ebe4fa7c92577c15038eed05f1f2f3b39dac
-
Filesize
328.9MB
MD598b90b48f6e8c9a73068c9d51213c423
SHA164899804fad1c73db34c68aa086b4cc1bef01385
SHA25699489b46354570660be3f44aac2c1fb2b164c55267541cd7980a228ad29991e8
SHA51264e903095545fcbead01280ffa47dfbd1b4802d775110919e4f9ebdd6848cc402f9f22e44cedbf61ff6660ce86c7bc72f3000b5a32ae1fb05a4d367cc9f9b839