Analysis
-
max time kernel
31s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
04/05/2023, 23:00
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
50050291542339510009.exe
Resource
win7-20230220-en
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
50050291542339510009.exe
Resource
win10v2004-20230220-en
4 signatures
150 seconds
General
-
Target
50050291542339510009.exe
-
Size
6.0MB
-
MD5
a092f3e2c7006d6630f9c322774c8734
-
SHA1
4747eeaa5d6e4ee3dfc248bb1c2cc2a95da0c56b
-
SHA256
043ac9383930fe022fb51e879fd51084e25482069cfcc385e8bfb228d3414c36
-
SHA512
d6372e66700fe0e740ac8c3ba0875e9a307fb29d55fdcfe7ff3e19f8fa0b41a14b443b4b6f317dfdf86dca672162f98179d36a3ff489ba0f3bd11fbfe2023419
-
SSDEEP
196608:H+Y+gfk3pMIxQHU7eAODQje5eWAa6U+HK:H+gdIWHUdKcWA4+H
Score
5/10
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 2012 50050291542339510009.exe 2012 50050291542339510009.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1380 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2012 50050291542339510009.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2012 wrote to memory of 1380 2012 50050291542339510009.exe 28 PID 2012 wrote to memory of 1380 2012 50050291542339510009.exe 28 PID 2012 wrote to memory of 1380 2012 50050291542339510009.exe 28 PID 2012 wrote to memory of 1380 2012 50050291542339510009.exe 28 PID 2012 wrote to memory of 1480 2012 50050291542339510009.exe 30 PID 2012 wrote to memory of 1480 2012 50050291542339510009.exe 30 PID 2012 wrote to memory of 1480 2012 50050291542339510009.exe 30 PID 2012 wrote to memory of 1480 2012 50050291542339510009.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\50050291542339510009.exe"C:\Users\Admin\AppData\Local\Temp\50050291542339510009.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe"2⤵
- Creates scheduled task(s)
PID:1380
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}"2⤵PID:1480
-