Analysis
-
max time kernel
205s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2023 17:09
Static task
static1
Behavioral task
behavioral1
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win10v2004-20230220-en
General
-
Target
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
-
Size
1.5MB
-
MD5
aba2d86ed17f587eb6d57e6c75f64f05
-
SHA1
aeccba64f4dd19033ac2226b4445faac05c88b76
-
SHA256
807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d
-
SHA512
c3f276820d6b2872c98fa36c7b62f236f9f2650b344a243a30dcda9ca08726f6ce27c5c380b4256a1a7d8d4309e1f2f270f10bad18099a8c9e1835925ea51806
-
SSDEEP
24576:pWKqa4hnzP3w7L3rmZmpk7FSQFW2iJ+N07/TwYV1CdZdQ+4lT+iFgiGTtswAtdz:pSrwf3aZmpOFU2iQNIUc1LxGTtswgd
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
mmc.exedescription ioc process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
mmc.exedescription pid process Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
mmc.exepid process 1192 mmc.exe 1192 mmc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ca4397da55b3175aaa1ad2c99981e792f66151.exe"C:\Users\Admin\AppData\Local\Temp\02ca4397da55b3175aaa1ad2c99981e792f66151.exe"1⤵
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/876-54-0x0000000000400000-0x000000000058C000-memory.dmpFilesize
1.5MB
-
memory/1192-59-0x0000000002870000-0x000000000288E000-memory.dmpFilesize
120KB
-
memory/1192-60-0x0000000002230000-0x0000000002231000-memory.dmpFilesize
4KB
-
memory/1192-61-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-62-0x000000001CD60000-0x000000001D0A6000-memory.dmpFilesize
3.3MB
-
memory/1192-65-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-64-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-66-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-67-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-68-0x000007FFFFF00000-0x000007FFFFF10000-memory.dmpFilesize
64KB
-
memory/1192-69-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-70-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-72-0x0000000002230000-0x0000000002231000-memory.dmpFilesize
4KB
-
memory/1192-73-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-74-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-75-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-76-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-77-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB
-
memory/1192-78-0x000007FFFFF00000-0x000007FFFFF10000-memory.dmpFilesize
64KB
-
memory/1192-80-0x0000000004050000-0x00000000040D0000-memory.dmpFilesize
512KB