Analysis
-
max time kernel
134s -
max time network
138s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
11-03-2023 13:42
Static task
static1
Behavioral task
behavioral1
Sample
f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe
Resource
win10v2004-20230220-en
General
-
Target
f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe
-
Size
4.6MB
-
MD5
3b03fce4671df646496d75488d16eaf8
-
SHA1
13b8b37d36c5c3114718e20f96daef0d3575c5fa
-
SHA256
f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960
-
SHA512
8e279ba83f9547cc083fb965a9027428c6a977a34449cccd6f7971b6b95cbffe729ba1ba6fad681a6f5eb70324826746fc82edbe5ec37d7f7317a121d83e5b5b
-
SSDEEP
98304:eFRP61hlce+gu3O+UHKZc+sRZvojwn6MTSrb:eFRPQzceZHOc3RxAwZG/
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1652 USOPrivateUSOShared-type6.3.1.4.exe 5020 USOPrivateUSOShared-type6.3.1.4.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4120 icacls.exe 4684 icacls.exe 984 icacls.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1304 set thread context of 1116 1304 f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe 85 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4032 schtasks.exe -
Suspicious use of WriteProcessMemory 19 IoCs
description pid Process procid_target PID 1304 wrote to memory of 1116 1304 f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe 85 PID 1304 wrote to memory of 1116 1304 f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe 85 PID 1304 wrote to memory of 1116 1304 f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe 85 PID 1304 wrote to memory of 1116 1304 f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe 85 PID 1304 wrote to memory of 1116 1304 f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe 85 PID 1116 wrote to memory of 4120 1116 AppLaunch.exe 92 PID 1116 wrote to memory of 4120 1116 AppLaunch.exe 92 PID 1116 wrote to memory of 4120 1116 AppLaunch.exe 92 PID 1116 wrote to memory of 4684 1116 AppLaunch.exe 94 PID 1116 wrote to memory of 4684 1116 AppLaunch.exe 94 PID 1116 wrote to memory of 4684 1116 AppLaunch.exe 94 PID 1116 wrote to memory of 984 1116 AppLaunch.exe 96 PID 1116 wrote to memory of 984 1116 AppLaunch.exe 96 PID 1116 wrote to memory of 984 1116 AppLaunch.exe 96 PID 1116 wrote to memory of 4032 1116 AppLaunch.exe 98 PID 1116 wrote to memory of 4032 1116 AppLaunch.exe 98 PID 1116 wrote to memory of 4032 1116 AppLaunch.exe 98 PID 1116 wrote to memory of 1652 1116 AppLaunch.exe 100 PID 1116 wrote to memory of 1652 1116 AppLaunch.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe"C:\Users\Admin\AppData\Local\Temp\f67397efbe737544ecc40af40d938c6635277220d48836ce0617b2dc9bba2960.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1304 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1116 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateUSOShared-type6.3.1.4" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4120
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateUSOShared-type6.3.1.4" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:4684
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\USOPrivateUSOShared-type6.3.1.4" /inheritance:e /deny "admin:(R,REA,RA,RD)"3⤵
- Modifies file permissions
PID:984
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "USOPrivateUSOShared-type6.3.1.4\USOPrivateUSOShared-type6.3.1.4" /TR "C:\ProgramData\USOPrivateUSOShared-type6.3.1.4\USOPrivateUSOShared-type6.3.1.4.exe" /SC MINUTE3⤵
- Creates scheduled task(s)
PID:4032
-
-
C:\ProgramData\USOPrivateUSOShared-type6.3.1.4\USOPrivateUSOShared-type6.3.1.4.exe"C:\ProgramData\USOPrivateUSOShared-type6.3.1.4\USOPrivateUSOShared-type6.3.1.4.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"3⤵
- Executes dropped EXE
PID:1652
-
-
-
C:\ProgramData\USOPrivateUSOShared-type6.3.1.4\USOPrivateUSOShared-type6.3.1.4.exeC:\ProgramData\USOPrivateUSOShared-type6.3.1.4\USOPrivateUSOShared-type6.3.1.4.exe1⤵
- Executes dropped EXE
PID:5020
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
716.9MB
MD5bbff028a2e2ad1967116b2785faf9798
SHA1678e6e5b2a80870622266e6d980958c1a53f8502
SHA2568587992c820a4ec0295ca3b8e4fd64b43818df0ce3175d6f925d451a71be829a
SHA51252afb69c982e925f0eccd255db9298684db4354c6ec26fa3b946e2758ea3a30387be6e37eb17f6ec23920750615e13c1af6f3c87b8f1cc9ad9e51e1368394edc
-
Filesize
716.9MB
MD5bbff028a2e2ad1967116b2785faf9798
SHA1678e6e5b2a80870622266e6d980958c1a53f8502
SHA2568587992c820a4ec0295ca3b8e4fd64b43818df0ce3175d6f925d451a71be829a
SHA51252afb69c982e925f0eccd255db9298684db4354c6ec26fa3b946e2758ea3a30387be6e37eb17f6ec23920750615e13c1af6f3c87b8f1cc9ad9e51e1368394edc
-
Filesize
614.0MB
MD5efe1610979a190e862e3b41addda6a5d
SHA17cf15821ab545c0a453ae4d7dec9cf87de0e44e3
SHA25672885d3bca36288586c427f0d2ba4ce2a576cfbaa98b0be88d28596fa328e67e
SHA5123676e8bc717b759fb1649cdf9503e04cb776dd1080c1fc475895b21835c3d9284cfa37061698cf4c3cbd4e307b08b3e896223d836d2cac2ba9f89529965bfcc9