Analysis
-
max time kernel
52s -
max time network
64s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
05-05-2023 20:27
Behavioral task
behavioral1
Sample
f19126b02be0b331982e041dc9bcad51.exe
Resource
win7-20230220-en
General
-
Target
f19126b02be0b331982e041dc9bcad51.exe
-
Size
223KB
-
MD5
f19126b02be0b331982e041dc9bcad51
-
SHA1
10ab04a6f24ce4540a564041375d8275a691e409
-
SHA256
2869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
-
SHA512
e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
SSDEEP
3072:fvfoUJQCw+d+Uoj9DVbDWb0Cdfc6mdSCFytxpNS17e+8TNBfxz9l:fvfoOQHelqJbD4HJe7FytVSle+8TxX
Malware Config
Extracted
gurcu
https://api.telegram.org/bot5975822207:AAFJtzAlzLoF8RfkpKUagQJGRi0ksib6w3g/sendMessage?chat_id=1396661331
Signatures
-
Deletes itself 1 IoCs
pid Process 1996 cmd.exe -
Executes dropped EXE 2 IoCs
pid Process 396 f19126b02be0b331982e041dc9bcad51.exe 1616 f19126b02be0b331982e041dc9bcad51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 2 IoCs
pid pid_target Process procid_target 1684 396 WerFault.exe 34 2012 1616 WerFault.exe 37 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 832 schtasks.exe -
Runs ping.exe 1 TTPs 1 IoCs
pid Process 860 PING.EXE -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1384 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 396 f19126b02be0b331982e041dc9bcad51.exe Token: SeDebugPrivilege 1616 f19126b02be0b331982e041dc9bcad51.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 1384 wrote to memory of 1996 1384 f19126b02be0b331982e041dc9bcad51.exe 29 PID 1384 wrote to memory of 1996 1384 f19126b02be0b331982e041dc9bcad51.exe 29 PID 1384 wrote to memory of 1996 1384 f19126b02be0b331982e041dc9bcad51.exe 29 PID 1996 wrote to memory of 1688 1996 cmd.exe 31 PID 1996 wrote to memory of 1688 1996 cmd.exe 31 PID 1996 wrote to memory of 1688 1996 cmd.exe 31 PID 1996 wrote to memory of 860 1996 cmd.exe 32 PID 1996 wrote to memory of 860 1996 cmd.exe 32 PID 1996 wrote to memory of 860 1996 cmd.exe 32 PID 1996 wrote to memory of 832 1996 cmd.exe 33 PID 1996 wrote to memory of 832 1996 cmd.exe 33 PID 1996 wrote to memory of 832 1996 cmd.exe 33 PID 1996 wrote to memory of 396 1996 cmd.exe 34 PID 1996 wrote to memory of 396 1996 cmd.exe 34 PID 1996 wrote to memory of 396 1996 cmd.exe 34 PID 396 wrote to memory of 1684 396 f19126b02be0b331982e041dc9bcad51.exe 35 PID 396 wrote to memory of 1684 396 f19126b02be0b331982e041dc9bcad51.exe 35 PID 396 wrote to memory of 1684 396 f19126b02be0b331982e041dc9bcad51.exe 35 PID 1728 wrote to memory of 1616 1728 taskeng.exe 37 PID 1728 wrote to memory of 1616 1728 taskeng.exe 37 PID 1728 wrote to memory of 1616 1728 taskeng.exe 37 PID 1616 wrote to memory of 2012 1616 f19126b02be0b331982e041dc9bcad51.exe 38 PID 1616 wrote to memory of 2012 1616 f19126b02be0b331982e041dc9bcad51.exe 38 PID 1616 wrote to memory of 2012 1616 f19126b02be0b331982e041dc9bcad51.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe"C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1384 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C chcp 65001 && ping 127.0.0.1 && schtasks /create /tn "f19126b02be0b331982e041dc9bcad51" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe" /rl HIGHEST /f && DEL /F /S /Q /A "C:\Users\Admin\AppData\Local\Temp\f19126b02be0b331982e041dc9bcad51.exe" &&START "" "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"2⤵
- Deletes itself
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\system32\chcp.comchcp 650013⤵PID:1688
-
-
C:\Windows\system32\PING.EXEping 127.0.0.13⤵
- Runs ping.exe
PID:860
-
-
C:\Windows\system32\schtasks.exeschtasks /create /tn "f19126b02be0b331982e041dc9bcad51" /sc MINUTE /tr "C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:832
-
-
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe"3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:396 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 396 -s 11884⤵
- Program crash
PID:1684
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {0D74BD60-B391-4A88-A1F8-37F33A83C0AF} S-1-5-21-2961826002-3968192592-354541192-1000:HVMHZIYD\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1728 -
C:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exeC:\Users\Admin\AppData\Local\NET.Framework\f19126b02be0b331982e041dc9bcad51.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1616 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 1616 -s 11923⤵
- Program crash
PID:2012
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c
-
Filesize
223KB
MD5f19126b02be0b331982e041dc9bcad51
SHA110ab04a6f24ce4540a564041375d8275a691e409
SHA2562869db18f346049bcc9e378a77ed809fd9caad2fd2bd4d9f58d6e728c784b3eb
SHA512e6158c6c1563ff3f013b97c0b5da7b5f3301657b948ddb1198ebaea7ce5fc3a9c9f3f449646f45c070514e8796e6315a2afaab7894ba20e3b857a5dc504d093c