Analysis
-
max time kernel
49s -
max time network
34s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
08/05/2023, 23:34
Static task
static1
Behavioral task
behavioral1
Sample
12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe
Resource
win10v2004-20230220-en
General
-
Target
12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe
-
Size
2.1MB
-
MD5
0d009ea0386e4668e4fe910f13092bf4
-
SHA1
21582aff48121712b63b0ab6a962edfe6ba023ea
-
SHA256
12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad
-
SHA512
7d35c4e4d36fcb03af1cba9d71bf400b39aeff631a3ffc9b15072aecf303a90ca1cd147825f8d26f3bcc877766d2c97bf3c27b63d542c08903fccfc06198e9f3
-
SSDEEP
24576:hFxTc+ThGLe8rLdqRHetdCeZTyVJNBqCgV2AGqaliurb0+sWydomQ73yJyttg+e1:Q5r0R6dJZ3P4zvrMDoUKHePwJNtI
Malware Config
Signatures
-
Drops file in System32 directory 1 IoCs
description ioc Process File opened for modification C:\Windows\System32\%ProgramData%\Microsoft\Windows\Start Menu\Programs\Accessories\Windows PowerShell\Windows PowerShell.lnk powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1624 powershell.exe 1732 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1624 powershell.exe Token: SeDebugPrivilege 2036 12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe Token: SeDebugPrivilege 1732 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2036 wrote to memory of 1624 2036 12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe 28 PID 2036 wrote to memory of 1624 2036 12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe 28 PID 2036 wrote to memory of 1624 2036 12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe 28 PID 432 wrote to memory of 1732 432 taskeng.exe 33 PID 432 wrote to memory of 1732 432 taskeng.exe 33 PID 432 wrote to memory of 1732 432 taskeng.exe 33 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe"C:\Users\Admin\AppData\Local\Temp\12a5158d4768fb51739e6b0fc155057116e20228c7ab22ef3e08dbfdca2e13ad.exe"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -ENC cwB0AGEAcgB0AC0AcwBsAGUAZQBwACAALQBzAGUAYwBvAG4AZABzACAAMgAwAA==2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1624
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {342B36C5-36B6-4C18-AAA5-30C63E1E1058} S-1-5-21-1283023626-844874658-3193756055-1000:THEQWNRW\Admin:S4U:1⤵
- Suspicious use of WriteProcessMemory
PID:432 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -NoProfile -enc UwBlAHQALQBNAHAAUAByAGUAZgBlAHIAZQBuAGMAZQAgAC0ARQB4AGMAbAB1AHMAaQBvAG4AUABhAHQAaAAgAEMAOgBcAA==2⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1732
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5f5bdbd6e3f388bd1aa1172c75cbaff9b
SHA1d5730e1c7a3e8f3a1e4d2e6fac30bf1d9698975a
SHA2561f2ef8483e6869c6d8d8328e33e8d2f9012870adcfdc770164ddcde67a0b29c9
SHA512f1041fa69437a392d08621261473f6a63923701e824acf00196cd9fcf8dac6c22ea323279cd0b9828de8dbc82fbca1e1bf2399f24bc74adea3bbb51ed4db320d
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\PQRR1Z94V6GX2WCTMJDY.temp
Filesize7KB
MD5f5bdbd6e3f388bd1aa1172c75cbaff9b
SHA1d5730e1c7a3e8f3a1e4d2e6fac30bf1d9698975a
SHA2561f2ef8483e6869c6d8d8328e33e8d2f9012870adcfdc770164ddcde67a0b29c9
SHA512f1041fa69437a392d08621261473f6a63923701e824acf00196cd9fcf8dac6c22ea323279cd0b9828de8dbc82fbca1e1bf2399f24bc74adea3bbb51ed4db320d