Analysis
-
max time kernel
53s -
max time network
178s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
13-03-2023 05:07
Static task
static1
Behavioral task
behavioral1
Sample
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
Resource
win10-20230220-en
General
-
Target
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
-
Size
4.7MB
-
MD5
e51f56cff8d20eabff2f5097e89617f0
-
SHA1
bb44250f7c7b658e0b004d1a50e8311401047f74
-
SHA256
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792
-
SHA512
a8db7f2e6ded80f4052d91083ff3ba5bb26af14cea16378cb840924792be42628b1770f0c977530383c8929c5fadb47c40a557012fb2aeeae53384f8c50ea7b3
-
SSDEEP
98304:XrNDnifgPgjhcObmRCevTu6QDiU98WJONhZ9gsb0jJu/2vJYL4oo2:XFBMuOCTpDLaqiRYLv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4700 WindowsHolographicDevicesOracle-type3.1.0.3.exe 4828 WindowsHolographicDevicesOracle-type3.1.0.3.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4280 icacls.exe 4348 icacls.exe 4308 icacls.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 3704 set thread context of 4400 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 69 PID 4400 set thread context of 4428 4400 AppLaunch.exe 71 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2288 schtasks.exe -
Suspicious use of WriteProcessMemory 30 IoCs
description pid Process procid_target PID 3704 wrote to memory of 4656 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 3704 wrote to memory of 4656 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 3704 wrote to memory of 4656 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 3704 wrote to memory of 4384 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 68 PID 3704 wrote to memory of 4384 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 68 PID 3704 wrote to memory of 4384 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 68 PID 3704 wrote to memory of 4400 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 69 PID 3704 wrote to memory of 4400 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 69 PID 3704 wrote to memory of 4400 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 69 PID 3704 wrote to memory of 4400 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 69 PID 3704 wrote to memory of 4400 3704 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 69 PID 4400 wrote to memory of 4428 4400 AppLaunch.exe 71 PID 4400 wrote to memory of 4428 4400 AppLaunch.exe 71 PID 4400 wrote to memory of 4428 4400 AppLaunch.exe 71 PID 4400 wrote to memory of 4428 4400 AppLaunch.exe 71 PID 4400 wrote to memory of 4428 4400 AppLaunch.exe 71 PID 4428 wrote to memory of 4348 4428 AppLaunch.exe 72 PID 4428 wrote to memory of 4348 4428 AppLaunch.exe 72 PID 4428 wrote to memory of 4348 4428 AppLaunch.exe 72 PID 4428 wrote to memory of 4308 4428 AppLaunch.exe 73 PID 4428 wrote to memory of 4308 4428 AppLaunch.exe 73 PID 4428 wrote to memory of 4308 4428 AppLaunch.exe 73 PID 4428 wrote to memory of 4280 4428 AppLaunch.exe 74 PID 4428 wrote to memory of 4280 4428 AppLaunch.exe 74 PID 4428 wrote to memory of 4280 4428 AppLaunch.exe 74 PID 4428 wrote to memory of 2288 4428 AppLaunch.exe 78 PID 4428 wrote to memory of 2288 4428 AppLaunch.exe 78 PID 4428 wrote to memory of 2288 4428 AppLaunch.exe 78 PID 4428 wrote to memory of 4700 4428 AppLaunch.exe 80 PID 4428 wrote to memory of 4700 4428 AppLaunch.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe"C:\Users\Admin\AppData\Local\Temp\e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:3704 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵PID:4656
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵PID:4384
-
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:4428 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:4348
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:4308
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3" /inheritance:e /deny "admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:4280
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3" /TR "C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe" /SC MINUTE4⤵
- Creates scheduled task(s)
PID:2288
-
-
C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe"C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Executes dropped EXE
PID:4700
-
-
-
-
C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exeC:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe1⤵
- Executes dropped EXE
PID:4828
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe
Filesize690.6MB
MD5d737da2c1344968c22bbd639a0c49553
SHA183de267e884f55842e7ebac6fbc7489e313c8d33
SHA256ba9f33257b06c56d25290e3deeb179c1c99f732a2b41f67450752b7de84cd663
SHA5127e6ed2b3ad882677b5e36cb60ed31c947bb4addd4286b5b119d60d63506558722cefcf120943aaf531b58177b6e89752a32cf7e4bcb3a7ffdcd87212a12a4f2d
-
C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe
Filesize690.6MB
MD5d737da2c1344968c22bbd639a0c49553
SHA183de267e884f55842e7ebac6fbc7489e313c8d33
SHA256ba9f33257b06c56d25290e3deeb179c1c99f732a2b41f67450752b7de84cd663
SHA5127e6ed2b3ad882677b5e36cb60ed31c947bb4addd4286b5b119d60d63506558722cefcf120943aaf531b58177b6e89752a32cf7e4bcb3a7ffdcd87212a12a4f2d
-
C:\ProgramData\WindowsHolographicDevicesOracle-type3.1.0.3\WindowsHolographicDevicesOracle-type3.1.0.3.exe
Filesize690.6MB
MD5d737da2c1344968c22bbd639a0c49553
SHA183de267e884f55842e7ebac6fbc7489e313c8d33
SHA256ba9f33257b06c56d25290e3deeb179c1c99f732a2b41f67450752b7de84cd663
SHA5127e6ed2b3ad882677b5e36cb60ed31c947bb4addd4286b5b119d60d63506558722cefcf120943aaf531b58177b6e89752a32cf7e4bcb3a7ffdcd87212a12a4f2d