Analysis

  • max time kernel
    118s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20230712-en
  • resource tags

    arch:x64arch:x86image:win7-20230712-enlocale:en-usos:windows7-x64system
  • submitted
    23-07-2023 02:13

General

  • Target

    87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe

  • Size

    1.2MB

  • MD5

    c417498058dcc5982157432ff63d33e9

  • SHA1

    a9909f37d3cef589e2086a5bb3dfc728596130f6

  • SHA256

    87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06

  • SHA512

    5e06e931c3e142aa0ec69452183a328595acb82009011e6bd702ccd2ed65bcfe075562a845e9f1aefadb74c2b731b3f84b684a116f1cf8bd20fd3b277d807844

  • SSDEEP

    24576:pN6GEf47+UgcarQNkRq/mczfSrio0cXNf:D6hf47+OarDRgLfSF0iN

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 28 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe
    "C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1928
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\XwWrHjBogFa.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1348
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\XwWrHjBogFa" /XML "C:\Users\Admin\AppData\Local\Temp\tmp84A.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:2628
    • C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe
      "C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe"
      2⤵
        PID:2844
      • C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe
        "C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe"
        2⤵
          PID:2716
        • C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe
          "C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe"
          2⤵
            PID:2784
          • C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe
            "C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe"
            2⤵
              PID:2956
            • C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe
              "C:\Users\Admin\AppData\Local\Temp\87832eaabe18c374549cc586c2dca63c84ff0792e88a80e85f6e452f0b22cf06.exe"
              2⤵
                PID:2672

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp84A.tmp

              Filesize

              1KB

              MD5

              66f0a2ee0ba1b2392dab3c47f5a0aace

              SHA1

              3aad666e23b3005c1c20977bff0cf1a3ab04d250

              SHA256

              44af104a320f435197622ae101df36d49de6da826bfed40d812e300a27ac15af

              SHA512

              04de9cd8f10830eca1d0e5a0dde79d1a4543f137239297914b9d062a4b262f1e8d65912ce000c46957e0ad5d5b5cafdde9e7187688d8bb9654220a6bfec2a32f

            • memory/1348-72-0x0000000002690000-0x00000000026D0000-memory.dmp

              Filesize

              256KB

            • memory/1348-70-0x0000000074210000-0x00000000747BB000-memory.dmp

              Filesize

              5.7MB

            • memory/1348-75-0x0000000074210000-0x00000000747BB000-memory.dmp

              Filesize

              5.7MB

            • memory/1348-74-0x0000000002690000-0x00000000026D0000-memory.dmp

              Filesize

              256KB

            • memory/1348-73-0x0000000002690000-0x00000000026D0000-memory.dmp

              Filesize

              256KB

            • memory/1348-71-0x0000000074210000-0x00000000747BB000-memory.dmp

              Filesize

              5.7MB

            • memory/1928-59-0x0000000004D00000-0x0000000004D40000-memory.dmp

              Filesize

              256KB

            • memory/1928-67-0x00000000741F0000-0x00000000748DE000-memory.dmp

              Filesize

              6.9MB

            • memory/1928-61-0x00000000059A0000-0x0000000005A4E000-memory.dmp

              Filesize

              696KB

            • memory/1928-56-0x0000000004D00000-0x0000000004D40000-memory.dmp

              Filesize

              256KB

            • memory/1928-60-0x0000000001F60000-0x0000000001F6A000-memory.dmp

              Filesize

              40KB

            • memory/1928-55-0x00000000741F0000-0x00000000748DE000-memory.dmp

              Filesize

              6.9MB

            • memory/1928-54-0x0000000000030000-0x000000000016E000-memory.dmp

              Filesize

              1.2MB

            • memory/1928-58-0x00000000741F0000-0x00000000748DE000-memory.dmp

              Filesize

              6.9MB

            • memory/1928-57-0x0000000001EF0000-0x0000000001EFE000-memory.dmp

              Filesize

              56KB