Analysis
-
max time kernel
149s -
max time network
136s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
28/06/2023, 14:22
Static task
static1
Behavioral task
behavioral1
Sample
file.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
file.exe
Resource
win10v2004-20230621-en
General
-
Target
file.exe
-
Size
486KB
-
MD5
168a81401f16e7a01e8c51ae761b825f
-
SHA1
e3c7f8b46cac83b9843169f56653b0a6a50a7032
-
SHA256
82a7b83bacb8a14b90742ab0cc14fdfa1f27713d634542a3c6a8e0d4940a6a61
-
SHA512
39a4f997efb5c1785e0e2d36d15bbcdf49823ac0cf9a231e313f30f9520e9f325de8029ac324edca08a29410cdd2e397bc6b2e05f2dc9a0afab57e755804edf8
-
SSDEEP
12288:laL63LUmfl+JYY2zcH1mqdb1gWyH/pZ1+J831Bs2YJ4RLQ0js05HXgf3:ljkcQA/t+q31GN4+2b1Xgf3
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\Control Panel\International\Geo\Nation file.exe -
Executes dropped EXE 1 IoCs
pid Process 100 svchost.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2177513644-1903222820-241662473-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\svchost = "\"C:\\Users\\Admin\\AppData\\Roaming\\svchost.exe\"" file.exe -
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 100 set thread context of 4364 100 svchost.exe 100 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2308 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 1796 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 2692 file.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 100 svchost.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe 4364 AddInProcess32.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2692 file.exe Token: SeDebugPrivilege 100 svchost.exe Token: SeDebugPrivilege 4364 AddInProcess32.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 2692 wrote to memory of 876 2692 file.exe 83 PID 2692 wrote to memory of 876 2692 file.exe 83 PID 2692 wrote to memory of 2248 2692 file.exe 85 PID 2692 wrote to memory of 2248 2692 file.exe 85 PID 876 wrote to memory of 2308 876 cmd.exe 87 PID 876 wrote to memory of 2308 876 cmd.exe 87 PID 2248 wrote to memory of 1796 2248 cmd.exe 88 PID 2248 wrote to memory of 1796 2248 cmd.exe 88 PID 2248 wrote to memory of 100 2248 cmd.exe 89 PID 2248 wrote to memory of 100 2248 cmd.exe 89 PID 100 wrote to memory of 3332 100 svchost.exe 90 PID 100 wrote to memory of 3332 100 svchost.exe 90 PID 100 wrote to memory of 812 100 svchost.exe 91 PID 100 wrote to memory of 812 100 svchost.exe 91 PID 100 wrote to memory of 3200 100 svchost.exe 92 PID 100 wrote to memory of 3200 100 svchost.exe 92 PID 100 wrote to memory of 936 100 svchost.exe 93 PID 100 wrote to memory of 936 100 svchost.exe 93 PID 100 wrote to memory of 2868 100 svchost.exe 94 PID 100 wrote to memory of 2868 100 svchost.exe 94 PID 100 wrote to memory of 3304 100 svchost.exe 95 PID 100 wrote to memory of 3304 100 svchost.exe 95 PID 100 wrote to memory of 1816 100 svchost.exe 96 PID 100 wrote to memory of 1816 100 svchost.exe 96 PID 100 wrote to memory of 3092 100 svchost.exe 97 PID 100 wrote to memory of 3092 100 svchost.exe 97 PID 100 wrote to memory of 5040 100 svchost.exe 98 PID 100 wrote to memory of 5040 100 svchost.exe 98 PID 100 wrote to memory of 2136 100 svchost.exe 99 PID 100 wrote to memory of 2136 100 svchost.exe 99 PID 100 wrote to memory of 4364 100 svchost.exe 100 PID 100 wrote to memory of 4364 100 svchost.exe 100 PID 100 wrote to memory of 4364 100 svchost.exe 100 PID 100 wrote to memory of 4364 100 svchost.exe 100 PID 100 wrote to memory of 4364 100 svchost.exe 100 PID 100 wrote to memory of 4364 100 svchost.exe 100 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\file.exe"C:\Users\Admin\AppData\Local\Temp\file.exe"1⤵
- Checks computer location settings
- Adds Run key to start application
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2692 -
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:876 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "svchost" /tr '"C:\Users\Admin\AppData\Roaming\svchost.exe"'3⤵
- Creates scheduled task(s)
PID:2308
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\tmpF4D4.tmp.bat""2⤵
- Suspicious use of WriteProcessMemory
PID:2248 -
C:\Windows\system32\timeout.exetimeout 33⤵
- Delays execution with timeout.exe
PID:1796
-
-
C:\Users\Admin\AppData\Roaming\svchost.exe"C:\Users\Admin\AppData\Roaming\svchost.exe"3⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:100 -
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInUtil.exe"4⤵PID:3332
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regbrowsers.exe"4⤵PID:812
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\InstallUtil.exe"4⤵PID:3200
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_regsql.exe"4⤵PID:936
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\EdmGen.exe"4⤵PID:2868
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\aspnet_wp.exe"4⤵PID:3304
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegAsm.exe"4⤵PID:1816
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\mscorsvw.exe"4⤵PID:3092
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\ilasm.exe"4⤵PID:5040
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\RegSvcs.exe"4⤵PID:2136
-
-
C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"C:\Windows\Microsoft.NET\Framework64\v4.0.30319\AddInProcess32.exe"4⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4364
-
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
151B
MD55f0088a9802373975760f8e0f5563c1e
SHA1b39f383a030d5dbc63f0eded8c90849331581875
SHA25666370079e9b4294250a7272f4a2a402847c5482283f193ad623794dd8fbbc8c5
SHA5120e9d22c343b2da574f1e33f2f4eb5a7555676c25c975905d27662c15042eed093c9440e8fe63bd2f0b65503720f5ae14f660f4382e617c7533ad4984972108ef
-
Filesize
486KB
MD5168a81401f16e7a01e8c51ae761b825f
SHA1e3c7f8b46cac83b9843169f56653b0a6a50a7032
SHA25682a7b83bacb8a14b90742ab0cc14fdfa1f27713d634542a3c6a8e0d4940a6a61
SHA51239a4f997efb5c1785e0e2d36d15bbcdf49823ac0cf9a231e313f30f9520e9f325de8029ac324edca08a29410cdd2e397bc6b2e05f2dc9a0afab57e755804edf8
-
Filesize
486KB
MD5168a81401f16e7a01e8c51ae761b825f
SHA1e3c7f8b46cac83b9843169f56653b0a6a50a7032
SHA25682a7b83bacb8a14b90742ab0cc14fdfa1f27713d634542a3c6a8e0d4940a6a61
SHA51239a4f997efb5c1785e0e2d36d15bbcdf49823ac0cf9a231e313f30f9520e9f325de8029ac324edca08a29410cdd2e397bc6b2e05f2dc9a0afab57e755804edf8