Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20230221-en -
resource tags
arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system -
submitted
07/06/2023, 15:45
Behavioral task
behavioral1
Sample
athena_pub_free.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
athena_pub_free.exe
Resource
win10v2004-20230221-en
General
-
Target
athena_pub_free.exe
-
Size
809KB
-
MD5
6f7b16c33986fbfde47534524a5f8d8d
-
SHA1
c0a9d3357ddf611cac70505475652976eebf696f
-
SHA256
ce21f4bdad7ec8aabb8df47bde4cb8227bb414c8a1e977451770e6a5ffa6c538
-
SHA512
f3bc1e207d84f25c713ccdce6da281ffcf12f031f7dc926ed8f07af9ee6215ceddd5ec1a4f6c658d0a24cdee45cf0f9aa818e6f8c562abecdcec5f8ea71a4010
-
SSDEEP
12288:VXe9PPlowWX0t6mOQwg1Qd15CcYk0We1HDpe+uJ5l1QHq1c7dGuW2pKcDgtFtfyL:chloDX0XOf4ze+uJ5nPc7CyXNNj
Malware Config
Signatures
-
Drops startup file 1 IoCs
description ioc Process File created C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\CZMTXM.lnk athena_pub_free.exe -
Executes dropped EXE 2 IoCs
pid Process 3028 EHGWII.exe 4760 EHGWII.exe -
resource yara_rule behavioral2/memory/3724-133-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-140-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-141-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-142-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-143-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/files/0x0003000000000733-144.dat upx behavioral2/files/0x0003000000000733-145.dat upx behavioral2/memory/3028-146-0x0000000000830000-0x00000000009F4000-memory.dmp upx behavioral2/memory/3724-147-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-148-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-149-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-151-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-152-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-153-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/files/0x0003000000000733-154.dat upx behavioral2/memory/4760-155-0x0000000000830000-0x00000000009F4000-memory.dmp upx behavioral2/memory/3724-156-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-157-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-158-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-159-0x0000000000220000-0x00000000003E4000-memory.dmp upx behavioral2/memory/3724-160-0x0000000000220000-0x00000000003E4000-memory.dmp upx -
Adds Run key to start application 2 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\Software\Microsoft\Windows\CurrentVersion\Run athena_pub_free.exe Set value (str) \REGISTRY\USER\S-1-5-21-2805025096-2326403612-4231045514-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\CZMTXM = "\"C:\\Users\\Admin\\AppData\\Roaming\\Windata\\EHGWII.exe\"" athena_pub_free.exe -
AutoIT Executable 17 IoCs
AutoIT scripts compiled to PE executables.
resource yara_rule behavioral2/memory/3724-140-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-141-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-142-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-143-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3028-146-0x0000000000830000-0x00000000009F4000-memory.dmp autoit_exe behavioral2/memory/3724-147-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-148-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-149-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-151-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-152-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-153-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/4760-155-0x0000000000830000-0x00000000009F4000-memory.dmp autoit_exe behavioral2/memory/3724-156-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-157-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-158-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-159-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe behavioral2/memory/3724-160-0x0000000000220000-0x00000000003E4000-memory.dmp autoit_exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3736 schtasks.exe -
NTFS ADS 1 IoCs
description ioc Process File opened for modification C:\Users\Admin\AppData\Local\Temp\winmgmts:\localhost\root\SecurityCenter2 athena_pub_free.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe 3724 athena_pub_free.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3724 athena_pub_free.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 3724 wrote to memory of 4780 3724 athena_pub_free.exe 86 PID 3724 wrote to memory of 4780 3724 athena_pub_free.exe 86 PID 3724 wrote to memory of 4780 3724 athena_pub_free.exe 86 PID 3724 wrote to memory of 1904 3724 athena_pub_free.exe 88 PID 3724 wrote to memory of 1904 3724 athena_pub_free.exe 88 PID 3724 wrote to memory of 1904 3724 athena_pub_free.exe 88 PID 4780 wrote to memory of 3736 4780 cmd.exe 89 PID 4780 wrote to memory of 3736 4780 cmd.exe 89 PID 4780 wrote to memory of 3736 4780 cmd.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\athena_pub_free.exe"C:\Users\Admin\AppData\Local\Temp\athena_pub_free.exe"1⤵
- Drops startup file
- Adds Run key to start application
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:3724 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c schtasks /create /tn CZMTXM.exe /tr C:\Users\Admin\AppData\Roaming\Windata\EHGWII.exe /sc minute /mo 12⤵
- Suspicious use of WriteProcessMemory
PID:4780 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn CZMTXM.exe /tr C:\Users\Admin\AppData\Roaming\Windata\EHGWII.exe /sc minute /mo 13⤵
- Creates scheduled task(s)
PID:3736
-
-
-
C:\Windows\SysWOW64\WSCript.exeWSCript C:\Users\Admin\AppData\Local\Temp\CZMTXM.vbs2⤵PID:1904
-
-
C:\Users\Admin\AppData\Roaming\Windata\EHGWII.exeC:\Users\Admin\AppData\Roaming\Windata\EHGWII.exe1⤵
- Executes dropped EXE
PID:3028
-
C:\Users\Admin\AppData\Roaming\Windata\EHGWII.exeC:\Users\Admin\AppData\Roaming\Windata\EHGWII.exe1⤵
- Executes dropped EXE
PID:4760
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
850B
MD5bd814346dd5876c4fadb606f068e8c23
SHA13712110dfda82806608a035d8293c727f557b4d8
SHA256af84b98001a4ddeadaa79bfc9c2c652e1a9b8e0eaf75e1fe8f1d17367453b5a2
SHA512df864bbde57d7de10024b657968410348e27aa1ae00e925b18716139cb19d793dbfbac3d082aceff322601e26209e9efa2d6d46eda85909145802003fbd53b72
-
Filesize
809KB
MD56f7b16c33986fbfde47534524a5f8d8d
SHA1c0a9d3357ddf611cac70505475652976eebf696f
SHA256ce21f4bdad7ec8aabb8df47bde4cb8227bb414c8a1e977451770e6a5ffa6c538
SHA512f3bc1e207d84f25c713ccdce6da281ffcf12f031f7dc926ed8f07af9ee6215ceddd5ec1a4f6c658d0a24cdee45cf0f9aa818e6f8c562abecdcec5f8ea71a4010
-
Filesize
809KB
MD56f7b16c33986fbfde47534524a5f8d8d
SHA1c0a9d3357ddf611cac70505475652976eebf696f
SHA256ce21f4bdad7ec8aabb8df47bde4cb8227bb414c8a1e977451770e6a5ffa6c538
SHA512f3bc1e207d84f25c713ccdce6da281ffcf12f031f7dc926ed8f07af9ee6215ceddd5ec1a4f6c658d0a24cdee45cf0f9aa818e6f8c562abecdcec5f8ea71a4010
-
Filesize
809KB
MD56f7b16c33986fbfde47534524a5f8d8d
SHA1c0a9d3357ddf611cac70505475652976eebf696f
SHA256ce21f4bdad7ec8aabb8df47bde4cb8227bb414c8a1e977451770e6a5ffa6c538
SHA512f3bc1e207d84f25c713ccdce6da281ffcf12f031f7dc926ed8f07af9ee6215ceddd5ec1a4f6c658d0a24cdee45cf0f9aa818e6f8c562abecdcec5f8ea71a4010