Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
06/03/2023, 07:11
Static task
static1
Behavioral task
behavioral1
Sample
4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe
Resource
win10-20230220-en
General
-
Target
4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe
-
Size
4.2MB
-
MD5
a37810cc29d9cfa64243c40ad8a5c3df
-
SHA1
a4a57a48d8436c859d524b9223710008f7c5e1ad
-
SHA256
4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1
-
SHA512
7db726cbc72ee93ee076a1a01913753bd3f722ba1c660281223d7939d1ad5fecf8e593b39e47d2bd15975d5f9796d059bde7eb87e8d3e087dad3e2818613644f
-
SSDEEP
98304:BEhTEG4s2Rk5cs38shhSNjJe+i4sYeq69DedTV0VbTXF2RAvRthw:BRG4sskf38s7MjJeVYT69id+VbaMc
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4624 MicrosoftTemplates-type6.5.2.0.exe 4356 MicrosoftTemplates-type6.5.2.0.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 1380 icacls.exe 1736 icacls.exe 3944 icacls.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4052 set thread context of 4816 4052 4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe 68 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1292 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 4052 wrote to memory of 4816 4052 4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe 68 PID 4052 wrote to memory of 4816 4052 4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe 68 PID 4052 wrote to memory of 4816 4052 4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe 68 PID 4052 wrote to memory of 4816 4052 4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe 68 PID 4052 wrote to memory of 4816 4052 4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe 68 PID 4816 wrote to memory of 1736 4816 AppLaunch.exe 69 PID 4816 wrote to memory of 1736 4816 AppLaunch.exe 69 PID 4816 wrote to memory of 1736 4816 AppLaunch.exe 69 PID 4816 wrote to memory of 3944 4816 AppLaunch.exe 71 PID 4816 wrote to memory of 3944 4816 AppLaunch.exe 71 PID 4816 wrote to memory of 3944 4816 AppLaunch.exe 71 PID 4816 wrote to memory of 1380 4816 AppLaunch.exe 73 PID 4816 wrote to memory of 1380 4816 AppLaunch.exe 73 PID 4816 wrote to memory of 1380 4816 AppLaunch.exe 73 PID 4816 wrote to memory of 1292 4816 AppLaunch.exe 75 PID 4816 wrote to memory of 1292 4816 AppLaunch.exe 75 PID 4816 wrote to memory of 1292 4816 AppLaunch.exe 75 PID 4816 wrote to memory of 4624 4816 AppLaunch.exe 77 PID 4816 wrote to memory of 4624 4816 AppLaunch.exe 77
Processes
-
C:\Users\Admin\AppData\Local\Temp\4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe"C:\Users\Admin\AppData\Local\Temp\4f0ac3c5044699eaa4b05c0ef07d473edf86eac732df5304dc0c42fc4349d6d1.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4052 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:4816 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftTemplates-type6.5.2.0" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1736
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftTemplates-type6.5.2.0" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:3944
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftTemplates-type6.5.2.0" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:1380
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "MicrosoftTemplates-type6.5.2.0\MicrosoftTemplates-type6.5.2.0" /TR "C:\ProgramData\MicrosoftTemplates-type6.5.2.0\MicrosoftTemplates-type6.5.2.0.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:1292
-
-
C:\ProgramData\MicrosoftTemplates-type6.5.2.0\MicrosoftTemplates-type6.5.2.0.exe"C:\ProgramData\MicrosoftTemplates-type6.5.2.0\MicrosoftTemplates-type6.5.2.0.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Executes dropped EXE
PID:4624
-
-
-
C:\ProgramData\MicrosoftTemplates-type6.5.2.0\MicrosoftTemplates-type6.5.2.0.exeC:\ProgramData\MicrosoftTemplates-type6.5.2.0\MicrosoftTemplates-type6.5.2.0.exe1⤵
- Executes dropped EXE
PID:4356
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
687.7MB
MD5b390315b658dda93aeba5e7db79e7446
SHA11db9fc8a31c2c868c7f1ad3f534b4eed53a44dfc
SHA256fbf4beed7e20b9f66e81b668c13752d4225868c807c9f7ada165ba12cb857a8c
SHA512d922a78f4ec3afd5f92f6074619470701afd33aa6e3643f169b802fde2c41fd9e6f43f9d56062fecbc3f0f4cb13a2f5291943478a07de9be58a7317710697ac7
-
Filesize
687.7MB
MD5b390315b658dda93aeba5e7db79e7446
SHA11db9fc8a31c2c868c7f1ad3f534b4eed53a44dfc
SHA256fbf4beed7e20b9f66e81b668c13752d4225868c807c9f7ada165ba12cb857a8c
SHA512d922a78f4ec3afd5f92f6074619470701afd33aa6e3643f169b802fde2c41fd9e6f43f9d56062fecbc3f0f4cb13a2f5291943478a07de9be58a7317710697ac7
-
Filesize
658.3MB
MD52206ec2836249e87fddbfc669bc64283
SHA17d73e9bd255588c1d5de770596449d3f2b8f5d49
SHA256990bc6d4a91577d4441b79ffd8671110c336e4f785feae5e42924a33baeed36d
SHA512e3fa1941fb44ed3fae32d09ec16f0f79263d4d33d3455ce593e9de178f36624911e98789e6e58a07d3e2321eb9d7c2668acf68d4d79554b474ec0b89626086bd