Analysis
-
max time kernel
56s -
max time network
177s -
platform
windows10-1703_x64 -
resource
win10-20230220-en -
resource tags
arch:x64arch:x86image:win10-20230220-enlocale:en-usos:windows10-1703-x64system -
submitted
15/03/2023, 05:21
Static task
static1
Behavioral task
behavioral1
Sample
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
Resource
win10-20230220-en
General
-
Target
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe
-
Size
4.7MB
-
MD5
e51f56cff8d20eabff2f5097e89617f0
-
SHA1
bb44250f7c7b658e0b004d1a50e8311401047f74
-
SHA256
e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792
-
SHA512
a8db7f2e6ded80f4052d91083ff3ba5bb26af14cea16378cb840924792be42628b1770f0c977530383c8929c5fadb47c40a557012fb2aeeae53384f8c50ea7b3
-
SSDEEP
98304:XrNDnifgPgjhcObmRCevTu6QDiU98WJONhZ9gsb0jJu/2vJYL4oo2:XFBMuOCTpDLaqiRYLv
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 4848 MicrosoftTemplates-type3.7.0.7.exe 4432 MicrosoftTemplates-type3.7.0.7.exe -
Modifies file permissions 1 TTPs 3 IoCs
pid Process 4776 icacls.exe 3068 icacls.exe 4784 icacls.exe -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1608 set thread context of 1420 1608 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 1420 set thread context of 3212 1420 AppLaunch.exe 69 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4604 schtasks.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1608 wrote to memory of 1420 1608 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 1608 wrote to memory of 1420 1608 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 1608 wrote to memory of 1420 1608 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 1608 wrote to memory of 1420 1608 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 1608 wrote to memory of 1420 1608 e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe 67 PID 1420 wrote to memory of 3212 1420 AppLaunch.exe 69 PID 1420 wrote to memory of 3212 1420 AppLaunch.exe 69 PID 1420 wrote to memory of 3212 1420 AppLaunch.exe 69 PID 1420 wrote to memory of 3212 1420 AppLaunch.exe 69 PID 1420 wrote to memory of 3212 1420 AppLaunch.exe 69 PID 3212 wrote to memory of 4776 3212 AppLaunch.exe 70 PID 3212 wrote to memory of 4776 3212 AppLaunch.exe 70 PID 3212 wrote to memory of 4776 3212 AppLaunch.exe 70 PID 3212 wrote to memory of 4784 3212 AppLaunch.exe 72 PID 3212 wrote to memory of 4784 3212 AppLaunch.exe 72 PID 3212 wrote to memory of 4784 3212 AppLaunch.exe 72 PID 3212 wrote to memory of 3068 3212 AppLaunch.exe 71 PID 3212 wrote to memory of 3068 3212 AppLaunch.exe 71 PID 3212 wrote to memory of 3068 3212 AppLaunch.exe 71 PID 3212 wrote to memory of 4604 3212 AppLaunch.exe 76 PID 3212 wrote to memory of 4604 3212 AppLaunch.exe 76 PID 3212 wrote to memory of 4604 3212 AppLaunch.exe 76 PID 3212 wrote to memory of 4848 3212 AppLaunch.exe 78 PID 3212 wrote to memory of 4848 3212 AppLaunch.exe 78
Processes
-
C:\Users\Admin\AppData\Local\Temp\e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe"C:\Users\Admin\AppData\Local\Temp\e25a1050eba1d2800e12178ec056082cb84e4825dfab58c3a44a173b6f9c1792.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1608 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"2⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\\Windows\\Microsoft.NET\\Framework\\v4.0.30319\\AppLaunch.exe"3⤵
- Suspicious use of WriteProcessMemory
PID:3212 -
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftTemplates-type3.7.0.7" /inheritance:e /deny "*S-1-1-0:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:4776
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftTemplates-type3.7.0.7" /inheritance:e /deny "admin:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:3068
-
-
C:\Windows\SysWOW64\icacls.exe"C:\Windows\System32\icacls.exe" "C:\ProgramData\MicrosoftTemplates-type3.7.0.7" /inheritance:e /deny "*S-1-5-7:(R,REA,RA,RD)"4⤵
- Modifies file permissions
PID:4784
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /CREATE /TN "MicrosoftTemplates-type3.7.0.7\MicrosoftTemplates-type3.7.0.7" /TR "C:\ProgramData\MicrosoftTemplates-type3.7.0.7\MicrosoftTemplates-type3.7.0.7.exe" /SC MINUTE4⤵
- Creates scheduled task(s)
PID:4604
-
-
C:\ProgramData\MicrosoftTemplates-type3.7.0.7\MicrosoftTemplates-type3.7.0.7.exe"C:\ProgramData\MicrosoftTemplates-type3.7.0.7\MicrosoftTemplates-type3.7.0.7.exe" "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"4⤵
- Executes dropped EXE
PID:4848
-
-
-
-
C:\ProgramData\MicrosoftTemplates-type3.7.0.7\MicrosoftTemplates-type3.7.0.7.exeC:\ProgramData\MicrosoftTemplates-type3.7.0.7\MicrosoftTemplates-type3.7.0.7.exe1⤵
- Executes dropped EXE
PID:4432
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
669.9MB
MD5d058ea6fc59fe839c33efa809feea861
SHA15f7b3bd5e26a9fe89601a868a83b7a274060e78f
SHA2565cee2821d2150b6d92ffacbd3d7884ccaef2a93d5fe26ebe706d546789d53301
SHA51226b2c48f4c1e314c1f579d7d4c853bd6864a97e0d9fee97be46780702ff9762bba084d90260a646b2a0f1c2f243ec419628b2523322d764dea335e11f9188320
-
Filesize
652.1MB
MD5e592fbf19e4eac4df09dd4d549ee120b
SHA155c0b5a16d1954bf924920b89fbd911bf2bc8f2c
SHA256c3e4ac9ba5ea23e7ce32ec89559a553a8e95d8aec22df04e2556d5c471d1e9c9
SHA51242f4b1e96f026db39b00ba298161e0e03eb027a025f6e524188d9ab03ab5391e3739f1056485c9cdb431fec66835bb4ddd2d2768b686847e38116c4031dea84a
-
Filesize
427.8MB
MD55bffdefc3c68c781cab44a5104e68fa5
SHA1eb94d05c9264b3e637409138045443583ab4ae8d
SHA25645c6c959a95f828dbd25c6dc0580511785bf13814c8fa2042ebd1f934d5b503d
SHA512904fabf0f00252297873ad9ada979502b0f7684e34f397959edab1bf9e7b940c1fb60b21fd7a41c6b0f64e437ab210fe54fdef40403854c9b18e970d65253592