Analysis
-
max time kernel
43s -
max time network
45s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03-05-2023 13:44
Behavioral task
behavioral1
Sample
f19126b02be0b331982e041dc9bcad51.exe
Resource
win7-20230220-en
General
-
Target
f19126b02be0b331982e041dc9bcad51.exe
-
Size
223KB
-
MD5
f19126b02be0b331982e041dc9bcad51
-
SHA1
10ab04a6f24ce4540a564041375d8275a691e409
-
SHA256
2869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
-
SHA512
e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
SSDEEP
3072:fvfoUJQCw+d+Uoj9DVbDWb0Cdfc6mdSCFytxpNS17e+8TNBfxz9l:fvfoOQHelqJbD4HJe7FytVSle+8TxX
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5975822207:AAFJtzAlzLoF8RfkpKUagQJGRi0ksib6w3g/sendMessage?chat_id=1396661331
Signatures
-
Deletes itself 1 IoCs
pid Process 1684 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 1508 f19126b02be0b331982e041dc9bcad51.exe 1824 f19126b02be0b331982e041dc9bcad51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 812 1508 WerFault.exe 34 1832 1824 WerFault.exe 37 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 324 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 1812 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1204 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 1508 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 1824 f19126b02be0b331982e041dc9bcad51.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1204 wrote to memory of 1684 1204 f19126b02be0b331982e041dc9bcad51.exe 29 PID 1204 wrote to memory of 1684 1204 f19126b02be0b331982e041dc9bcad51.exe 29 PID 1204 wrote to memory of 1684 1204 f19126b02be0b331982e041dc9bcad51.exe 29 PID 1684 wrote to memory of 988 1684 cmd.exe 31 PID 1684 wrote to memory of 988 1684 cmd.exe 31 PID 1684 wrote to memory of 988 1684 cmd.exe 31 PID 1684 wrote to memory of 1812 1684 cmd.exe 32 PID 1684 wrote to memory of 1812 1684 cmd.exe 32 PID 1684 wrote to memory of 1812 1684 cmd.exe 32 PID 1684 wrote to memory of 324 1684 cmd.exe 33 PID 1684 wrote to memory of 324 1684 cmd.exe 33 PID 1684 wrote to memory of 324 1684 cmd.exe 33 PID 1684 wrote to memory of 1508 1684 cmd.exe 34 PID 1684 wrote to memory of 1508 1684 cmd.exe 34 PID 1684 wrote to memory of 1508 1684 cmd.exe 34 PID 1508 wrote to memory of 812 1508 f19126b02be0b331982e041dc9bcad51.exe 35 PID 1508 wrote to memory of 812 1508 f19126b02be0b331982e041dc9bcad51.exe 35 PID 1508 wrote to memory of 812 1508 f19126b02be0b331982e041dc9bcad51.exe 35 PID 1964 wrote to memory of 1824 1964 taskeng.exe 37 PID 1964 wrote to memory of 1824 1964 taskeng.exe 37 PID 1964 wrote to memory of 1824 1964 taskeng.exe 37 PID 1824 wrote to memory of 1832 1824 f19126b02be0b331982e041dc9bcad51.exe 38 PID 1824 wrote to memory of 1832 1824 f19126b02be0b331982e041dc9bcad51.exe 38 PID 1824 wrote to memory of 1832 1824 f19126b02be0b331982e041dc9bcad51.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe"C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1204 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "f19126b02be0b331982e041dc9bcad51" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe" &&START "" "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:988
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:1812
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "f19126b02be0b331982e041dc9bcad51" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:324
-
-
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1508 -s 11924⤵
- Program crash
PID:812
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {83618085-1C8B-4151-BA27-84FCE93C61A7} S-1-5-21-3499517378-2376672570-1134980332-1000:MLXLFKOI\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1964 -
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exeC:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1824 -s 11963⤵
- Program crash
PID:1832
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c