Analysis
-
max time kernel
135s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
04-05-2023 23:00
Static task
static1
Behavioral task
behavioral1
Sample
50050291542339510009.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
50050291542339510009.exe
Resource
win10v2004-20230220-en
General
-
Target
50050291542339510009.exe
-
Size
6.0MB
-
MD5
a092f3e2c7006d6630f9c322774c8734
-
SHA1
4747eeaa5d6e4ee3dfc248bb1c2cc2a95da0c56b
-
SHA256
043ac9383930fe022fb51e879fd51084e25482069cfcc385e8bfb228d3414c36
-
SHA512
d6372e66700fe0e740ac8c3ba0875e9a307fb29d55fdcfe7ff3e19f8fa0b41a14b443b4b6f317dfdf86dca672162f98179d36a3ff489ba0f3bd11fbfe2023419
-
SSDEEP
196608:H+Y+gfk3pMIxQHU7eAODQje5eWAa6U+HK:H+gdIWHUdKcWA4+H
Malware Config
Signatures
-
Suspicious use of NtSetInformationThreadHideFromDebugger 2 IoCs
pid Process 4564 50050291542339510009.exe 4564 50050291542339510009.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4780 schtasks.exe 2716 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4564 50050291542339510009.exe 4564 50050291542339510009.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 4564 wrote to memory of 4780 4564 50050291542339510009.exe 83 PID 4564 wrote to memory of 4780 4564 50050291542339510009.exe 83 PID 4564 wrote to memory of 4780 4564 50050291542339510009.exe 83 PID 4564 wrote to memory of 1636 4564 50050291542339510009.exe 85 PID 4564 wrote to memory of 1636 4564 50050291542339510009.exe 85 PID 4564 wrote to memory of 1636 4564 50050291542339510009.exe 85 PID 4564 wrote to memory of 2716 4564 50050291542339510009.exe 87 PID 4564 wrote to memory of 2716 4564 50050291542339510009.exe 87 PID 4564 wrote to memory of 2716 4564 50050291542339510009.exe 87
Processes
-
C:\Users\Admin\AppData\Local\Temp\50050291542339510009.exe"C:\Users\Admin\AppData\Local\Temp\50050291542339510009.exe"1⤵
- Suspicious use of NtSetInformationThreadHideFromDebugger
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4564 -
C:\Windows\SysWOW64\schtasks.exe/C /create /F /sc minute /mo 5 /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /tr "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\TSTheme.exe"2⤵
- Creates scheduled task(s)
PID:4780
-
-
C:\Windows\SysWOW64\schtasks.exe/C /Query /XML /TN "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}"2⤵PID:1636
-
-
C:\Windows\SysWOW64\schtasks.exe/C /create /F /tn "TSTheme Server Module{Q4F5H2C4V3-J6F4M7O4-A3E4F2Q1}" /XML "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\TSTheme\6745645343447557"2⤵
- Creates scheduled task(s)
PID:2716
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5a6337feaabef90566f31f182b1e3a485
SHA1ef64c54eeca5be9a5b1e8312bfe82e003153eae9
SHA256fe06f6e37a50f6dfcb40c10629493c396ca54248c82e4270268c7e06130ac9a9
SHA51278ad2189fd6f17ee7b3ce39966ddd3b460c6b0327fb22c0789e32565f50c3983cbd5ece8b162902110898cabc9503c16dc7c73e02ee7ffb1a2b6766e7210dfb2