Analysis
-
max time kernel
134s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
27-03-2023 12:07
Behavioral task
behavioral1
Sample
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe
Resource
win7-20230220-en
General
-
Target
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe
-
Size
203KB
-
MD5
702681c442d61dc4a9719bd3e377dc17
-
SHA1
7d191d6a62e3abdd7d45d5d50fcce0abd421ea9e
-
SHA256
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1
-
SHA512
2dc0ccf469987567cf4f962cf82d412c16e61a4b9e9ca12f62d8a08897db6cbe39fab4c6f839ff19ec1a5676e52b452f444fee2f6f403856fd1ce3ec73205123
-
SSDEEP
6144:sLV6Bta6dtJmakIM53n/kAflqT1une7R0s1e2:sLV6Btpmkc/FU5e2
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\NAT Service = "C:\\Program Files (x86)\\NAT Service\\natsvc.exe" 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Drops file in Program Files directory 2 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription ioc process File created C:\Program Files (x86)\NAT Service\natsvc.exe 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe File opened for modification C:\Program Files (x86)\NAT Service\natsvc.exe 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
Processes:
schtasks.exeschtasks.exepid process 1904 schtasks.exe 1372 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exepid process 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exepid process 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription pid process Token: SeDebugPrivilege 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exedescription pid process target process PID 4076 wrote to memory of 1904 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 4076 wrote to memory of 1904 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 4076 wrote to memory of 1904 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 4076 wrote to memory of 1372 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 4076 wrote to memory of 1372 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe PID 4076 wrote to memory of 1372 4076 540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe"C:\Users\Admin\AppData\Local\Temp\540003093308be1893002f0a75e73be010488151d91e36d4a19b8260557e68f1.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAT Service" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7CC6.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "NAT Service Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp7D73.tmp"2⤵
- Creates scheduled task(s)
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp7CC6.tmpFilesize
1KB
MD5e8ab067ce435e2de2db97623909269d4
SHA12257a6f8de044c4bc6cc1d50af0504ecca064198
SHA2565a8ead83b5f748e5dc8e854c5f1eb8d3aebd0529aef6753c3b72dc1c9e820509
SHA5120101c06c1323b5be0ccec7f445b71e80e0628243c58cbda9afbf1cffb6af7c82efece95bfc57274469410263cff019589b64287b6124e4bcd6ddfe3f3315018a
-
C:\Users\Admin\AppData\Local\Temp\tmp7D73.tmpFilesize
1KB
MD545cb9fac03bbbeb9a6e82b85eb3efbda
SHA14d6c00b68434d11f346ce844ccbc2ed7b7d4acff
SHA256185deb301fb4155d92e158bad5a52722c63ae7399a5b9d3d875050d5389b933a
SHA51200713c53d7193660ba223a47fa46225cb6d870ea5ea794f703efc73e21e6e01b7283dac5be3d5280e553b922521e32bc7db591bf471bd7673a1a0b62b198073b
-
memory/4076-133-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB
-
memory/4076-141-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB
-
memory/4076-142-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB
-
memory/4076-143-0x0000000001250000-0x0000000001260000-memory.dmpFilesize
64KB