Analysis
-
max time kernel
136s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
23-03-2023 10:59
Behavioral task
behavioral1
Sample
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe
Resource
win7-20230220-en
General
-
Target
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe
-
Size
203KB
-
MD5
702681c442d61dc4a9719bd3e377dc17
-
SHA1
7d191d6a62e3abdd7d45d5d50fcce0abd421ea9e
-
SHA256
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1
-
SHA512
2dc0ccf469987567cf4f962cf82d412c16e61a4b9e9ca12f62d8a08897db6cbe39fab4c6f839ff19ec1a5676e52b452f444fee2f6f403856fd1ce3ec73205123
-
SSDEEP
6144:sLV6Bta6dtJmakIM53n/kAflqT1une7R0s1e2:sLV6Btpmkc/FU5e2
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\SAAS Monitor = "C:\\Program Files (x86)\\SAAS Monitor\\saasmon.exe" 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Drops file in Program Files directory 2 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription ioc process File created C:\Program Files (x86)\SAAS Monitor\saasmon.exe 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe File opened for modification C:\Program Files (x86)\SAAS Monitor\saasmon.exe 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 2800 schtasks.exe 3136 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exepid process 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exepid process 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription pid process Token: SeDebugPrivilege 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription pid process target process PID 2472 wrote to memory of 2800 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 2472 wrote to memory of 2800 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 2472 wrote to memory of 2800 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 2472 wrote to memory of 3136 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 2472 wrote to memory of 3136 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 2472 wrote to memory of 3136 2472 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe"C:\Users\Admin\AppData\Local\Temp\540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SAAS Monitor" /xml "C:\Users\Admin\AppData\Local\Temp\tmpDE30.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "SAAS Monitor Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmpDF0B.tmp"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmpDE30.tmpFilesize
1KB
MD5e8ab067ce435e2de2db97623909269d4
SHA12257a6f8de044c4bc6cc1d50af0504ecca064198
SHA2565a8ead83b5f748e5dc8e854c5f1eb8d3aebd0529aef6753c3b72dc1c9e820509
SHA5120101c06c1323b5be0ccec7f445b71e80e0628243c58cbda9afbf1cffb6af7c82efece95bfc57274469410263cff019589b64287b6124e4bcd6ddfe3f3315018a
-
C:\Users\Admin\AppData\Local\Temp\tmpDF0B.tmpFilesize
1KB
MD58a92e4176a36b704a55c4888e04853e2
SHA16efbd8d0097e2632ca90083974b845f93e5b6a5c
SHA25691f88494715f51246ed7255ad4bba50e2f5dec26bef203f31450a6a8e1443cdd
SHA5124ea87f28391b022cfad5e0f695c2413a5addb18a6e9fdf9c56c4121253cf6e532110da8200b1c57b43ee85ed047f1530b1516a7c689c9574af069176114fa157
-
memory/2472-136-0x00000000018C0000-0x00000000018D0000-memory.dmpFilesize
64KB
-
memory/2472-141-0x00000000018C0000-0x00000000018D0000-memory.dmpFilesize
64KB
-
memory/2472-142-0x00000000018C0000-0x00000000018D0000-memory.dmpFilesize
64KB
-
memory/2472-143-0x00000000018C0000-0x00000000018D0000-memory.dmpFilesize
64KB