Analysis
-
max time kernel
139s -
max time network
106s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
21-06-2023 13:38
Static task
static1
Behavioral task
behavioral1
Sample
07238099.exe
Resource
win7-20230621-en
General
-
Target
07238099.exe
-
Size
557KB
-
MD5
b76188bafa717975768bd24d09ffeb09
-
SHA1
f623849274e0303a33a20f28d5b972869b89f947
-
SHA256
e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63
-
SHA512
859f1fd0877779779059fad437d8ddf5b0bd7e0f4fb724dfe1cc9bee069f2cc8339e7bfdb94fa5d0e65d0fbfb72a9cbe18c578cb249c7a12cbbda59282ab5b43
-
SSDEEP
12288:p/XPduH5pchAXVcDy2sol2Eq3Upx5wFoSTJrT:pNu0hw0y2xOU4T
Malware Config
Extracted
laplas
clipper.guru
-
api_key
afc950a4a18fd71c9d7be4c460e4cb77d0bcf29a49d097e4e739c17c332c3a34
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2000 svcupdater.exe 988 svcupdater.exe -
Loads dropped DLL 2 IoCs
pid Process 2000 svcupdater.exe 2000 svcupdater.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1760 set thread context of 528 1760 07238099.exe 28 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1384 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 7 IoCs
pid Process 1760 07238099.exe 1760 07238099.exe 1760 07238099.exe 2000 svcupdater.exe 2000 svcupdater.exe 2000 svcupdater.exe 2000 svcupdater.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1760 07238099.exe Token: SeDebugPrivilege 528 07238099.exe Token: SeDebugPrivilege 2000 svcupdater.exe -
Suspicious use of WriteProcessMemory 48 IoCs
description pid Process procid_target PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 1760 wrote to memory of 528 1760 07238099.exe 28 PID 528 wrote to memory of 560 528 07238099.exe 29 PID 528 wrote to memory of 560 528 07238099.exe 29 PID 528 wrote to memory of 560 528 07238099.exe 29 PID 528 wrote to memory of 560 528 07238099.exe 29 PID 560 wrote to memory of 1384 560 cmd.exe 31 PID 560 wrote to memory of 1384 560 cmd.exe 31 PID 560 wrote to memory of 1384 560 cmd.exe 31 PID 560 wrote to memory of 1384 560 cmd.exe 31 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 1632 wrote to memory of 2000 1632 taskeng.exe 33 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 988 2000 svcupdater.exe 34 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35 PID 2000 wrote to memory of 1868 2000 svcupdater.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\07238099.exe"C:\Users\Admin\AppData\Local\Temp\07238099.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1760 -
C:\Users\Admin\AppData\Local\Temp\07238099.exe"C:\Users\Admin\AppData\Local\Temp\07238099.exe"2⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:528 -
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /C schtasks /create /tn \svcupdater /tr "C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f3⤵
- Suspicious use of WriteProcessMemory
PID:560 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn \svcupdater /tr "C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe" /st 00:00 /du 9999:59 /sc once /ri 1 /f4⤵
- Creates scheduled task(s)
PID:1384
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {5FB97A4A-596D-463F-A2AC-FF342AA9BA4C} S-1-5-21-3419557010-3639509551-242374962-1000:IULNABEW\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exeC:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2000 -
C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe"C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe"3⤵
- Executes dropped EXE
PID:988
-
-
C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe"C:\Users\Admin\AppData\Roaming\svcupdater\svcupdater.exe"3⤵PID:1868
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
557KB
MD5b76188bafa717975768bd24d09ffeb09
SHA1f623849274e0303a33a20f28d5b972869b89f947
SHA256e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63
SHA512859f1fd0877779779059fad437d8ddf5b0bd7e0f4fb724dfe1cc9bee069f2cc8339e7bfdb94fa5d0e65d0fbfb72a9cbe18c578cb249c7a12cbbda59282ab5b43
-
Filesize
557KB
MD5b76188bafa717975768bd24d09ffeb09
SHA1f623849274e0303a33a20f28d5b972869b89f947
SHA256e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63
SHA512859f1fd0877779779059fad437d8ddf5b0bd7e0f4fb724dfe1cc9bee069f2cc8339e7bfdb94fa5d0e65d0fbfb72a9cbe18c578cb249c7a12cbbda59282ab5b43
-
Filesize
557KB
MD5b76188bafa717975768bd24d09ffeb09
SHA1f623849274e0303a33a20f28d5b972869b89f947
SHA256e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63
SHA512859f1fd0877779779059fad437d8ddf5b0bd7e0f4fb724dfe1cc9bee069f2cc8339e7bfdb94fa5d0e65d0fbfb72a9cbe18c578cb249c7a12cbbda59282ab5b43
-
Filesize
557KB
MD5b76188bafa717975768bd24d09ffeb09
SHA1f623849274e0303a33a20f28d5b972869b89f947
SHA256e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63
SHA512859f1fd0877779779059fad437d8ddf5b0bd7e0f4fb724dfe1cc9bee069f2cc8339e7bfdb94fa5d0e65d0fbfb72a9cbe18c578cb249c7a12cbbda59282ab5b43
-
Filesize
557KB
MD5b76188bafa717975768bd24d09ffeb09
SHA1f623849274e0303a33a20f28d5b972869b89f947
SHA256e5bc55ce98909742d2f1353b3bc8749ecc71206a5b8fa2e656d2a3ae186c1e63
SHA512859f1fd0877779779059fad437d8ddf5b0bd7e0f4fb724dfe1cc9bee069f2cc8339e7bfdb94fa5d0e65d0fbfb72a9cbe18c578cb249c7a12cbbda59282ab5b43