Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20230621-en -
resource tags
arch:x64arch:x86image:win7-20230621-enlocale:en-usos:windows7-x64system -
submitted
02/07/2023, 13:01
Static task
static1
Behavioral task
behavioral1
Sample
45723-svcrunexe.exe
Resource
win7-20230621-en
Behavioral task
behavioral2
Sample
45723-svcrunexe.exe
Resource
win10v2004-20230621-en
General
-
Target
45723-svcrunexe.exe
-
Size
1.4MB
-
MD5
0bd721ab9bb5dc918218a743053cf41a
-
SHA1
63fd3a2650472397f31a88ffe210c8b46181963e
-
SHA256
89373f83f2101957b75bd4323f22c6c7e0449ab2044f3d061b8417ba8b29c7a3
-
SHA512
0bb7c79a5230ddf2bf34dae55652ef2193f9ec7c1d0174a4f792a9f62c9515114d6c2f355d061610505132c1ae2a9e735d998f2abdfeb0ad1f7ac7424b2d4605
-
SSDEEP
24576:GGCnmunfR2L6OLAEOR7VS7Jhzbk5VjPIFNoA0S5FeiPFDPYnQ6RrAHWJpP:GLnmTaEZ7vnuBPIFNoAxL9DAF3JN
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1296 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2032 45723-svcrunexe.exe 1488 powershell.exe 2032 45723-svcrunexe.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2032 45723-svcrunexe.exe Token: SeDebugPrivilege 1488 powershell.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 2032 wrote to memory of 1488 2032 45723-svcrunexe.exe 28 PID 2032 wrote to memory of 1488 2032 45723-svcrunexe.exe 28 PID 2032 wrote to memory of 1488 2032 45723-svcrunexe.exe 28 PID 2032 wrote to memory of 1564 2032 45723-svcrunexe.exe 30 PID 2032 wrote to memory of 1564 2032 45723-svcrunexe.exe 30 PID 2032 wrote to memory of 1564 2032 45723-svcrunexe.exe 30 PID 1564 wrote to memory of 1296 1564 cmd.exe 32 PID 1564 wrote to memory of 1296 1564 cmd.exe 32 PID 1564 wrote to memory of 1296 1564 cmd.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\45723-svcrunexe.exe"C:\Users\Admin\AppData\Local\Temp\45723-svcrunexe.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2032 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"powershell" -Command Add-MpPreference -ExclusionPath 'C:\ProgramData'2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1488
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "TSMSOQO" /tr "C:\ProgramData\datajs\TSMSOQO.exe"2⤵
- Suspicious use of WriteProcessMemory
PID:1564 -
C:\Windows\system32\schtasks.exeschtasks /create /f /sc MINUTE /mo 5 /RL HIGHEST /tn "TSMSOQO" /tr "C:\ProgramData\datajs\TSMSOQO.exe"3⤵
- Creates scheduled task(s)
PID:1296
-
-