Overview
overview
10Static
static
10202ad65f39...2f.exe
windows7-x64
10202ad65f39...2f.exe
windows10-2004-x64
102722079047...42.exe
windows7-x64
72722079047...42.exe
windows10-2004-x64
761b08c9b1c...29.exe
windows7-x64
1061b08c9b1c...29.exe
windows10-2004-x64
10a89d4dfabf...a9.exe
windows7-x64
10a89d4dfabf...a9.exe
windows10-2004-x64
10bb1e9db6d9...76.exe
windows7-x64
7bb1e9db6d9...76.exe
windows10-2004-x64
7e9fca3db7f...67.exe
windows7-x64
10e9fca3db7f...67.exe
windows10-2004-x64
10Analysis
-
max time kernel
128s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20230220-en -
resource tags
arch:x64arch:x86image:win7-20230220-enlocale:en-usos:windows7-x64system -
submitted
13-05-2023 20:34
Behavioral task
behavioral1
Sample
202ad65f3956cde4764d1a789c3bac46a8b9dca3203c783a1efdc058bd94022f.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
202ad65f3956cde4764d1a789c3bac46a8b9dca3203c783a1efdc058bd94022f.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral3
Sample
27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe
Resource
win7-20230220-en
Behavioral task
behavioral4
Sample
27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral5
Sample
61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe
Resource
win7-20230220-en
Behavioral task
behavioral6
Sample
61b08c9b1c1f836a8fe354ae53110ffc66ef1ecb9ea353b345d7690a0bb3be29.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral7
Sample
a89d4dfabf30a221b56db35ebe5b5852ad16fc8e8828d169219e97c849ec5fa9.exe
Resource
win7-20230220-en
Behavioral task
behavioral8
Sample
a89d4dfabf30a221b56db35ebe5b5852ad16fc8e8828d169219e97c849ec5fa9.exe
Resource
win10v2004-20230220-en
Behavioral task
behavioral9
Sample
bb1e9db6d9b4b5a858987999a1c8b68ea3610382968c36771da27a6625eba776.exe
Resource
win7-20230220-en
Behavioral task
behavioral10
Sample
bb1e9db6d9b4b5a858987999a1c8b68ea3610382968c36771da27a6625eba776.exe
Resource
win10v2004-20230221-en
Behavioral task
behavioral11
Sample
e9fca3db7f9c56f58cc1e28118c9897aa3cd0d2e052c62b3aed472bede51e467.exe
Resource
win7-20230220-en
Behavioral task
behavioral12
Sample
e9fca3db7f9c56f58cc1e28118c9897aa3cd0d2e052c62b3aed472bede51e467.exe
Resource
win10v2004-20230220-en
General
-
Target
27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe
-
Size
1.7MB
-
MD5
9ec8bc3dbfdcfe1540bd3274181ae9bb
-
SHA1
a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
-
SHA256
27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
-
SHA512
d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117
-
SSDEEP
49152:1Tvt1GjeX+xaFTx+IJPPpU4XOulXn8djKj:1T7zOaaqPpv8d2
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 1012 OneDrive.exe 560 OneDrive.exe -
Loads dropped DLL 3 IoCs
pid Process 1520 taskeng.exe 1520 taskeng.exe 1520 taskeng.exe -
resource yara_rule behavioral3/memory/1732-55-0x0000000001090000-0x00000000016DF000-memory.dmp upx behavioral3/memory/1732-56-0x0000000001090000-0x00000000016DF000-memory.dmp upx behavioral3/memory/1732-78-0x0000000001090000-0x00000000016DF000-memory.dmp upx behavioral3/files/0x000b000000012309-82.dat upx behavioral3/files/0x000b000000012309-81.dat upx behavioral3/files/0x000b000000012309-84.dat upx behavioral3/files/0x000b000000012309-83.dat upx behavioral3/memory/1012-85-0x0000000000DC0000-0x000000000140F000-memory.dmp upx behavioral3/memory/1732-87-0x0000000001090000-0x00000000016DF000-memory.dmp upx behavioral3/files/0x000b000000012309-89.dat upx behavioral3/files/0x000b000000012309-90.dat upx behavioral3/memory/560-91-0x0000000000110000-0x000000000075F000-memory.dmp upx behavioral3/memory/560-92-0x0000000000110000-0x000000000075F000-memory.dmp upx behavioral3/memory/560-114-0x0000000000110000-0x000000000075F000-memory.dmp upx behavioral3/memory/560-117-0x0000000000110000-0x000000000075F000-memory.dmp upx -
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 1732 set thread context of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 560 set thread context of 1324 560 OneDrive.exe 36 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1556 schtasks.exe -
Suspicious use of WriteProcessMemory 31 IoCs
description pid Process procid_target PID 1732 wrote to memory of 1556 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 28 PID 1732 wrote to memory of 1556 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 28 PID 1732 wrote to memory of 1556 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 28 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1732 wrote to memory of 524 1732 27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe 30 PID 1520 wrote to memory of 1012 1520 taskeng.exe 34 PID 1520 wrote to memory of 1012 1520 taskeng.exe 34 PID 1520 wrote to memory of 1012 1520 taskeng.exe 34 PID 1520 wrote to memory of 560 1520 taskeng.exe 35 PID 1520 wrote to memory of 560 1520 taskeng.exe 35 PID 1520 wrote to memory of 560 1520 taskeng.exe 35 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 PID 560 wrote to memory of 1324 560 OneDrive.exe 36 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe"C:\Users\Admin\AppData\Local\Temp\27220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:1732 -
C:\Windows\system32\schtasks.exeschtasks /create /sc minute /mo 1 /tn OneDrive /rl HIGHEST /tr C:\Users\Admin\AppData\Local\OneDrive\OneDrive.exe2⤵
- Creates scheduled task(s)
PID:1556
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe 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2⤵PID:524
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {AC077DCC-A91B-4CD7-8897-BB5241ED91E8} S-1-5-21-2647223082-2067913677-935928954-1000:BPOQNXYB\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1520 -
C:\Users\Admin\AppData\Local\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Local\OneDrive\OneDrive.exe2⤵
- Executes dropped EXE
PID:1012
-
-
C:\Users\Admin\AppData\Local\OneDrive\OneDrive.exeC:\Users\Admin\AppData\Local\OneDrive\OneDrive.exe2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe 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3⤵PID:1324
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1.7MB
MD59ec8bc3dbfdcfe1540bd3274181ae9bb
SHA1a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
SHA25627220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
SHA512d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117
-
Filesize
1.7MB
MD59ec8bc3dbfdcfe1540bd3274181ae9bb
SHA1a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
SHA25627220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
SHA512d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117
-
Filesize
1.7MB
MD59ec8bc3dbfdcfe1540bd3274181ae9bb
SHA1a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
SHA25627220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
SHA512d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117
-
Filesize
1.7MB
MD59ec8bc3dbfdcfe1540bd3274181ae9bb
SHA1a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
SHA25627220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
SHA512d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117
-
Filesize
1.7MB
MD59ec8bc3dbfdcfe1540bd3274181ae9bb
SHA1a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
SHA25627220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
SHA512d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117
-
Filesize
1.7MB
MD59ec8bc3dbfdcfe1540bd3274181ae9bb
SHA1a5e610f5e4d56e7ac8c7b6b20a2726cf362ba316
SHA25627220790475f6cf42fbaff5e5fbdfe452b7d79116547878b01ecdbc1c6a5b942
SHA512d030b4b8beb58fd683ebb5f883566dbe8fab5a8bacad52f45e428eb71efdd90c6d35629769ac461a35f94471cd57d943d6e6bd8898596919b34eacaca701d117