Analysis
-
max time kernel
72s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20230220-en -
resource tags
arch:x64arch:x86image:win10v2004-20230220-enlocale:en-usos:windows10-2004-x64system -
submitted
09/06/2023, 15:10
Static task
static1
Behavioral task
behavioral1
Sample
PXU422.exe
Resource
win7-20230220-en
Behavioral task
behavioral2
Sample
PXU422.exe
Resource
win10v2004-20230220-en
General
-
Target
PXU422.exe
-
Size
753KB
-
MD5
6a6816bc6f0c4e9da9f8b5ed0863eed1
-
SHA1
56d2c76029c5d2036a697f2b9f1e5f9564f7c2ee
-
SHA256
a278b60ab0bd9823527c0d86509a3a5f31f107e4f8e70761cd62395e27738a0f
-
SHA512
ad7830f9a85858ce057832611527fddd4d6bc0ad0a01a1d6dd362fd360ef354f405a627d123aba42987e4cdffc1b36a4940e4ec59c1df43e8394f5fe2cf56b4e
-
SSDEEP
12288:rKewx/NscEQ+vgXK1Hsa+cmKo1W5qlp1HoADehqfx7b5w4JC2Off03i0mMRry8B+:eewlqB6p5pKosquA0a7C4JCan9y8Ae5Q
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2548970870-3691742953-3895070203-1000\Control Panel\International\Geo\Nation PXU422.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1016 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 3448 PXU422.exe 4844 powershell.exe 4844 powershell.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 3448 PXU422.exe Token: SeDebugPrivilege 4844 powershell.exe -
Suspicious use of WriteProcessMemory 21 IoCs
description pid Process procid_target PID 3448 wrote to memory of 4844 3448 PXU422.exe 92 PID 3448 wrote to memory of 4844 3448 PXU422.exe 92 PID 3448 wrote to memory of 4844 3448 PXU422.exe 92 PID 3448 wrote to memory of 1016 3448 PXU422.exe 94 PID 3448 wrote to memory of 1016 3448 PXU422.exe 94 PID 3448 wrote to memory of 1016 3448 PXU422.exe 94 PID 3448 wrote to memory of 2476 3448 PXU422.exe 96 PID 3448 wrote to memory of 2476 3448 PXU422.exe 96 PID 3448 wrote to memory of 2476 3448 PXU422.exe 96 PID 3448 wrote to memory of 1608 3448 PXU422.exe 97 PID 3448 wrote to memory of 1608 3448 PXU422.exe 97 PID 3448 wrote to memory of 1608 3448 PXU422.exe 97 PID 3448 wrote to memory of 4968 3448 PXU422.exe 100 PID 3448 wrote to memory of 4968 3448 PXU422.exe 100 PID 3448 wrote to memory of 4968 3448 PXU422.exe 100 PID 3448 wrote to memory of 1476 3448 PXU422.exe 99 PID 3448 wrote to memory of 1476 3448 PXU422.exe 99 PID 3448 wrote to memory of 1476 3448 PXU422.exe 99 PID 3448 wrote to memory of 3156 3448 PXU422.exe 98 PID 3448 wrote to memory of 3156 3448 PXU422.exe 98 PID 3448 wrote to memory of 3156 3448 PXU422.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\PXU422.exe"C:\Users\Admin\AppData\Local\Temp\PXU422.exe"1⤵
- Checks computer location settings
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:3448 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pEtRWDrPAr.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4844
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pEtRWDrPAr" /XML "C:\Users\Admin\AppData\Local\Temp\tmp1E07.tmp"2⤵
- Creates scheduled task(s)
PID:1016
-
-
C:\Users\Admin\AppData\Local\Temp\PXU422.exe"C:\Users\Admin\AppData\Local\Temp\PXU422.exe"2⤵PID:2476
-
-
C:\Users\Admin\AppData\Local\Temp\PXU422.exe"C:\Users\Admin\AppData\Local\Temp\PXU422.exe"2⤵PID:1608
-
-
C:\Users\Admin\AppData\Local\Temp\PXU422.exe"C:\Users\Admin\AppData\Local\Temp\PXU422.exe"2⤵PID:3156
-
-
C:\Users\Admin\AppData\Local\Temp\PXU422.exe"C:\Users\Admin\AppData\Local\Temp\PXU422.exe"2⤵PID:1476
-
-
C:\Users\Admin\AppData\Local\Temp\PXU422.exe"C:\Users\Admin\AppData\Local\Temp\PXU422.exe"2⤵PID:4968
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD58f7e5a7153e2aed35702a7f5930fec48
SHA134aeda68b568f6f2aa643b51841862179586d3a9
SHA2568b7fa33e212ffab3e95d7fd2659e6684e655960cd0c11ba0e3d89c594d9fa7a6
SHA5123b42a0bc78eec9b6b13da8a6fe114a54caecdafe445ef4408fdafd9f952e9477eeada4e39d8c12c7be3281973e1d2aa000429217939740f722dc6f511ddb88d9