Analysis
-
max time kernel
205s -
max time network
211s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
10-04-2023 17:09
Static task
static1
Behavioral task
behavioral1
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
Resource
win10v2004-20230220-en
General
-
Target
02ca4397da55b3175aaa1ad2c99981e792f66151.exe
-
Size
1.5MB
-
MD5
aba2d86ed17f587eb6d57e6c75f64f05
-
SHA1
aeccba64f4dd19033ac2226b4445faac05c88b76
-
SHA256
807126cbae47c03c99590d081b82d5761e0b9c57a92736fc8516cf41bc564a7d
-
SHA512
c3f276820d6b2872c98fa36c7b62f236f9f2650b344a243a30dcda9ca08726f6ce27c5c380b4256a1a7d8d4309e1f2f270f10bad18099a8c9e1835925ea51806
-
SSDEEP
24576:pWKqa4hnzP3w7L3rmZmpk7FSQFW2iJ+N07/TwYV1CdZdQ+4lT+iFgiGTtswAtdz:pSrwf3aZmpOFU2iQNIUc1LxGTtswgd
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
Processes:
mmc.exedescription ioc Process File opened for modification C:\Windows\system32\taskschd.msc mmc.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
mmc.exedescription pid Process Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe Token: 33 1192 mmc.exe Token: SeIncBasePriorityPrivilege 1192 mmc.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
mmc.exepid Process 1192 mmc.exe 1192 mmc.exe -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\02ca4397da55b3175aaa1ad2c99981e792f66151.exe"C:\Users\Admin\AppData\Local\Temp\02ca4397da55b3175aaa1ad2c99981e792f66151.exe"1⤵PID:876
-
C:\Windows\system32\mmc.exe"C:\Windows\system32\mmc.exe" "C:\Windows\system32\taskschd.msc" /s1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
PID:1192