Analysis
-
max time kernel
146s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20230621-en -
resource tags
arch:x64arch:x86image:win10v2004-20230621-enlocale:en-usos:windows10-2004-x64system -
submitted
30/06/2023, 12:26
Static task
static1
Behavioral task
behavioral1
Sample
Temp1.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
Temp1.exe
Resource
win10v2004-20230621-en
General
-
Target
Temp1.exe
-
Size
375KB
-
MD5
83ccb5c523ac9743f9db41460fe8fcd2
-
SHA1
25b4f65c963cf5c8ddd5e283e337be74d394768c
-
SHA256
f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
-
SHA512
8e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99
-
SSDEEP
6144:rvrQtqccMhb9VxU/aido6WXjQ0WU7+OLBOZYJmQs+gvUUudBfa4AtzqJVHnqRkY4:7cEcc69VixU7+OUZYsmAUUui4azq+iv9
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 964 asg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-508929744-1894537824-211734425-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\WSUS Update Client = "\"C:\\Users\\Admin\\AppData\\Local\\Temp\\Temp1.exe\"" Temp1.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 13 ip-api.com -
Drops file in System32 directory 4 IoCs
description ioc Process File created C:\Windows\SysWOW64\SubDir\asg.exe Temp1.exe File opened for modification C:\Windows\SysWOW64\SubDir\asg.exe Temp1.exe File opened for modification C:\Windows\SysWOW64\SubDir\asg.exe asg.exe File opened for modification C:\Windows\SysWOW64\SubDir asg.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3760 schtasks.exe 4772 schtasks.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2664 Temp1.exe Token: SeDebugPrivilege 964 asg.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 964 asg.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 2664 wrote to memory of 3760 2664 Temp1.exe 84 PID 2664 wrote to memory of 3760 2664 Temp1.exe 84 PID 2664 wrote to memory of 964 2664 Temp1.exe 86 PID 2664 wrote to memory of 964 2664 Temp1.exe 86 PID 964 wrote to memory of 4772 964 asg.exe 89 PID 964 wrote to memory of 4772 964 asg.exe 89 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\Temp1.exe"C:\Users\Admin\AppData\Local\Temp\Temp1.exe"1⤵
- Adds Run key to start application
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\Temp1.exe" /rl HIGHEST /f2⤵
- Creates scheduled task(s)
PID:3760
-
-
C:\Windows\SysWOW64\SubDir\asg.exe"C:\Windows\SysWOW64\SubDir\asg.exe"2⤵
- Executes dropped EXE
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:964 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "WSUS Update Client" /sc ONLOGON /tr "C:\Windows\SysWOW64\SubDir\asg.exe" /rl HIGHEST /f3⤵
- Creates scheduled task(s)
PID:4772
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
375KB
MD583ccb5c523ac9743f9db41460fe8fcd2
SHA125b4f65c963cf5c8ddd5e283e337be74d394768c
SHA256f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
SHA5128e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99
-
Filesize
375KB
MD583ccb5c523ac9743f9db41460fe8fcd2
SHA125b4f65c963cf5c8ddd5e283e337be74d394768c
SHA256f05700c9cb3ee995d0b557716280c9e79c1f68ee6d57ce7a4f87b0ee4433fe29
SHA5128e748c29b7097dcd56f5b7b92d7fcc104d9c11c349f268d258e9b2c6210e2d6bafda2d61b3d97fbe8c2e3b6caffe9b7b995cfee2b3240014029a6775d7af0e99