Analysis
-
max time kernel
30s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
03/05/2023, 14:39
Static task
static1
Behavioral task
behavioral1
Sample
cveswindows.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
cveswindows.exe
Resource
win10v2004-20230221-en
General
-
Target
cveswindows.exe
-
Size
5.8MB
-
MD5
1daf1ae4b628a3a2dabacfe41a81b893
-
SHA1
ac8a194c36738db2d93d4a5f5f4bd32af9a83d6c
-
SHA256
01055e217335489d11bfba457b0ced01a06afe2270e4eec442347c93794df578
-
SHA512
78eb58ba78c52acb547a58123ef09be3cbe23d5bbd908eee227907739d8a95bfbeb5c139208db56e6224ba2e9006a18f2ed43167577666d07456c6c5ff93308b
-
SSDEEP
49152:wx9WSKBz35isrb/T+vO90d7HjmAFd4A64nsfJHHpXqpWh28XcqYG3gy60g/Qt3xe:9F35X0pjzugkMjuBOjEx
Malware Config
Signatures
-
Drops file in Program Files directory 1 IoCs
description ioc Process File created C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe cveswindows.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 cveswindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString cveswindows.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier cveswindows.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1872 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 816 PING.EXE -
Suspicious use of AdjustPrivilegeToken 40 IoCs
description pid Process Token: SeIncreaseQuotaPrivilege 1752 WMIC.exe Token: SeSecurityPrivilege 1752 WMIC.exe Token: SeTakeOwnershipPrivilege 1752 WMIC.exe Token: SeLoadDriverPrivilege 1752 WMIC.exe Token: SeSystemProfilePrivilege 1752 WMIC.exe Token: SeSystemtimePrivilege 1752 WMIC.exe Token: SeProfSingleProcessPrivilege 1752 WMIC.exe Token: SeIncBasePriorityPrivilege 1752 WMIC.exe Token: SeCreatePagefilePrivilege 1752 WMIC.exe Token: SeBackupPrivilege 1752 WMIC.exe Token: SeRestorePrivilege 1752 WMIC.exe Token: SeShutdownPrivilege 1752 WMIC.exe Token: SeDebugPrivilege 1752 WMIC.exe Token: SeSystemEnvironmentPrivilege 1752 WMIC.exe Token: SeRemoteShutdownPrivilege 1752 WMIC.exe Token: SeUndockPrivilege 1752 WMIC.exe Token: SeManageVolumePrivilege 1752 WMIC.exe Token: 33 1752 WMIC.exe Token: 34 1752 WMIC.exe Token: 35 1752 WMIC.exe Token: SeIncreaseQuotaPrivilege 1752 WMIC.exe Token: SeSecurityPrivilege 1752 WMIC.exe Token: SeTakeOwnershipPrivilege 1752 WMIC.exe Token: SeLoadDriverPrivilege 1752 WMIC.exe Token: SeSystemProfilePrivilege 1752 WMIC.exe Token: SeSystemtimePrivilege 1752 WMIC.exe Token: SeProfSingleProcessPrivilege 1752 WMIC.exe Token: SeIncBasePriorityPrivilege 1752 WMIC.exe Token: SeCreatePagefilePrivilege 1752 WMIC.exe Token: SeBackupPrivilege 1752 WMIC.exe Token: SeRestorePrivilege 1752 WMIC.exe Token: SeShutdownPrivilege 1752 WMIC.exe Token: SeDebugPrivilege 1752 WMIC.exe Token: SeSystemEnvironmentPrivilege 1752 WMIC.exe Token: SeRemoteShutdownPrivilege 1752 WMIC.exe Token: SeUndockPrivilege 1752 WMIC.exe Token: SeManageVolumePrivilege 1752 WMIC.exe Token: 33 1752 WMIC.exe Token: 34 1752 WMIC.exe Token: 35 1752 WMIC.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1740 wrote to memory of 1752 1740 cveswindows.exe 28 PID 1740 wrote to memory of 1752 1740 cveswindows.exe 28 PID 1740 wrote to memory of 1752 1740 cveswindows.exe 28 PID 1740 wrote to memory of 1872 1740 cveswindows.exe 31 PID 1740 wrote to memory of 1872 1740 cveswindows.exe 31 PID 1740 wrote to memory of 1872 1740 cveswindows.exe 31 PID 1740 wrote to memory of 1508 1740 cveswindows.exe 33 PID 1740 wrote to memory of 1508 1740 cveswindows.exe 33 PID 1740 wrote to memory of 1508 1740 cveswindows.exe 33 PID 1508 wrote to memory of 816 1508 cmd.exe 35 PID 1508 wrote to memory of 816 1508 cmd.exe 35 PID 1508 wrote to memory of 816 1508 cmd.exe 35 PID 1508 wrote to memory of 1940 1508 cmd.exe 36 PID 1508 wrote to memory of 1940 1508 cmd.exe 36 PID 1508 wrote to memory of 1940 1508 cmd.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\cveswindows.exe"C:\Users\Admin\AppData\Local\Temp\cveswindows.exe"1⤵
- Drops file in Program Files directory
- Checks processor information in registry
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\System32\wbem\WMIC.exeC:\Windows\System32\wbem\WMIC.exe computersystem get model,manufacturer2⤵
- Suspicious use of AdjustPrivilegeToken
PID:1752
-
-
C:\Windows\system32\schtasks.exeC:\Windows\system32\schtasks.exe /CREATE /XML C:\Users\Admin\AppData\Local\Temp\RuEwPQCHNVrG /F /TN ChromeUpdateTaskMachinCore2⤵
- Creates scheduled task(s)
PID:1872
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c ping 127.0.0.1 -n 2 & start /min "C:\Program Files\ChromeUpdateTaskMachinCore\ChromeUpdateTaskMachinCore.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1508 -
C:\Windows\system32\PING.EXEping 127.0.0.1 -n 23⤵
- Runs ping.exe
PID:816
-
-
C:\Windows\system32\cmd.execmd.exe3⤵PID:1940
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5b3e592dbadf1ebc6205d986df5aa0b2a
SHA1b8c1569fcbcd2c9dda695073e97f3c94cfcc43c9
SHA256c05cf5ebf5b0ff0be1d8b0a73948241480aada6a0371262a6aa82cb606717098
SHA5129745114e508079c3c1f2b343dcf4e9c9a3e796acc0cd8f75fe7e046cd9040c98d48282e1f100fed74828ebbe414d6e0b58bfc73cd9a5d11de8babde3bc8b94c5