Analysis
-
max time kernel
70s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20230915-en -
resource tags
arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system -
submitted
12/10/2023, 00:59
Static task
static1
Behavioral task
behavioral1
Sample
tmp.exe
Resource
win7-20230831-en
Behavioral task
behavioral2
Sample
tmp.exe
Resource
win10v2004-20230915-en
General
-
Target
tmp.exe
-
Size
5.4MB
-
MD5
ac5a067a49c0347a26cb08dbf77f45b2
-
SHA1
961323bf26e320183019c6a759373017fa1d1ec2
-
SHA256
c89c74a42dc7e8ba62490a3f73f031caec9ec3579bc69d169abc2bfd2e3719d2
-
SHA512
fecabc22397856af602384d99f017ecb2b3624d96ae6fcc95f34b860fcb8b4c94c6e957b120762499ea72de7ca9b0e628252196093ec12f57b176641b8c00d94
-
SSDEEP
98304:cAWVhcggbXvZnyKbxK0UiIeYjRJFpFx9e+11:cHyLKN/eeRJpHv1
Malware Config
Signatures
-
Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
description pid Process procid_target PID 4624 created 3148 4624 tmp.exe 49 PID 4624 created 3148 4624 tmp.exe 49 PID 4624 created 3148 4624 tmp.exe 49 PID 4624 created 3148 4624 tmp.exe 49 PID 4624 created 3148 4624 tmp.exe 49 PID 4624 created 3148 4624 tmp.exe 49 -
Drops file in Drivers directory 1 IoCs
description ioc Process File created C:\Windows\System32\drivers\etc\hosts tmp.exe -
Stops running service(s) 3 TTPs
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 4624 set thread context of 2540 4624 tmp.exe 111 -
Launches sc.exe 5 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 1964 sc.exe 2112 sc.exe 2400 sc.exe 1828 sc.exe 3788 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4128 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 18 IoCs
pid Process 4624 tmp.exe 4624 tmp.exe 2204 powershell.exe 2204 powershell.exe 4624 tmp.exe 4624 tmp.exe 4624 tmp.exe 4624 tmp.exe 4624 tmp.exe 4624 tmp.exe 4624 tmp.exe 4624 tmp.exe 2540 dialer.exe 2540 dialer.exe 2540 dialer.exe 2540 dialer.exe 4624 tmp.exe 4624 tmp.exe -
Suspicious use of AdjustPrivilegeToken 10 IoCs
description pid Process Token: SeDebugPrivilege 2204 powershell.exe Token: SeShutdownPrivilege 3520 powercfg.exe Token: SeCreatePagefilePrivilege 3520 powercfg.exe Token: SeShutdownPrivilege 2604 powercfg.exe Token: SeCreatePagefilePrivilege 2604 powercfg.exe Token: SeShutdownPrivilege 4300 powercfg.exe Token: SeCreatePagefilePrivilege 4300 powercfg.exe Token: SeShutdownPrivilege 4772 powercfg.exe Token: SeCreatePagefilePrivilege 4772 powercfg.exe Token: SeDebugPrivilege 2540 dialer.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 3696 wrote to memory of 3788 3696 cmd.exe 100 PID 3696 wrote to memory of 3788 3696 cmd.exe 100 PID 3696 wrote to memory of 1964 3696 cmd.exe 101 PID 3696 wrote to memory of 1964 3696 cmd.exe 101 PID 3696 wrote to memory of 2112 3696 cmd.exe 102 PID 3696 wrote to memory of 2112 3696 cmd.exe 102 PID 3696 wrote to memory of 2400 3696 cmd.exe 103 PID 3696 wrote to memory of 2400 3696 cmd.exe 103 PID 3696 wrote to memory of 1828 3696 cmd.exe 104 PID 3696 wrote to memory of 1828 3696 cmd.exe 104 PID 4280 wrote to memory of 3520 4280 cmd.exe 107 PID 4280 wrote to memory of 3520 4280 cmd.exe 107 PID 4280 wrote to memory of 2604 4280 cmd.exe 108 PID 4280 wrote to memory of 2604 4280 cmd.exe 108 PID 4280 wrote to memory of 4300 4280 cmd.exe 109 PID 4280 wrote to memory of 4300 4280 cmd.exe 109 PID 4280 wrote to memory of 4772 4280 cmd.exe 110 PID 4280 wrote to memory of 4772 4280 cmd.exe 110 PID 4624 wrote to memory of 2540 4624 tmp.exe 111 PID 2540 wrote to memory of 620 2540 dialer.exe 14 PID 2540 wrote to memory of 688 2540 dialer.exe 4 PID 2540 wrote to memory of 952 2540 dialer.exe 7 PID 2540 wrote to memory of 316 2540 dialer.exe 6 PID 2540 wrote to memory of 520 2540 dialer.exe 10 PID 688 wrote to memory of 2432 688 lsass.exe 55 PID 688 wrote to memory of 2432 688 lsass.exe 55 PID 2540 wrote to memory of 1000 2540 dialer.exe 81 PID 2540 wrote to memory of 1088 2540 dialer.exe 80 PID 688 wrote to memory of 2432 688 lsass.exe 55 PID 688 wrote to memory of 2432 688 lsass.exe 55 PID 2540 wrote to memory of 1096 2540 dialer.exe 15 PID 2540 wrote to memory of 1120 2540 dialer.exe 79 PID 2540 wrote to memory of 1140 2540 dialer.exe 78 PID 2540 wrote to memory of 1236 2540 dialer.exe 77 PID 2540 wrote to memory of 1288 2540 dialer.exe 76 PID 2540 wrote to memory of 1344 2540 dialer.exe 75 PID 2540 wrote to memory of 1444 2540 dialer.exe 74 PID 2540 wrote to memory of 1452 2540 dialer.exe 73 PID 2540 wrote to memory of 1516 2540 dialer.exe 72 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Windows\system32\lsass.exeC:\Windows\system32\lsass.exe1⤵
- Suspicious use of WriteProcessMemory
PID:688
-
C:\Windows\system32\dwm.exe"dwm.exe"1⤵PID:316
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM1⤵PID:952
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc1⤵PID:520
-
C:\Windows\system32\winlogon.exewinlogon.exe2⤵PID:620
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService1⤵PID:1096
-
C:\Windows\Explorer.EXEC:\Windows\Explorer.EXE1⤵PID:3148
-
C:\Users\Admin\AppData\Local\Temp\tmp.exe"C:\Users\Admin\AppData\Local\Temp\tmp.exe"2⤵
- Suspicious use of NtCreateUserProcessOtherParentProcess
- Drops file in Drivers directory
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:4624
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exeC:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2204
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc2⤵
- Suspicious use of WriteProcessMemory
PID:3696 -
C:\Windows\System32\sc.exesc stop UsoSvc3⤵
- Launches sc.exe
PID:3788
-
-
C:\Windows\System32\sc.exesc stop WaaSMedicSvc3⤵
- Launches sc.exe
PID:1964
-
-
C:\Windows\System32\sc.exesc stop wuauserv3⤵
- Launches sc.exe
PID:2112
-
-
C:\Windows\System32\sc.exesc stop bits3⤵
- Launches sc.exe
PID:2400
-
-
C:\Windows\System32\sc.exesc stop dosvc3⤵
- Launches sc.exe
PID:1828
-
-
-
C:\Windows\System32\cmd.exeC:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 02⤵
- Suspicious use of WriteProcessMemory
PID:4280 -
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:3520
-
-
C:\Windows\System32\powercfg.exepowercfg /x -hibernate-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:2604
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-ac 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4300
-
-
C:\Windows\System32\powercfg.exepowercfg /x -standby-timeout-dc 03⤵
- Suspicious use of AdjustPrivilegeToken
PID:4772
-
-
-
C:\Windows\System32\dialer.exeC:\Windows\System32\dialer.exe2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2540
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"2⤵PID:3980
-
-
C:\Windows\System32\schtasks.exeC:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml"2⤵
- Creates scheduled task(s)
PID:4128
-
-
C:\Windows\sysmon.exeC:\Windows\sysmon.exe1⤵PID:2432
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s nsi1⤵PID:1516
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem1⤵PID:1452
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k netsvcs -p -s Themes1⤵PID:1444
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog1⤵PID:1344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager1⤵PID:1288
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc1⤵PID:1236
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc1⤵PID:1140
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc1⤵PID:1120
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule1⤵PID:1088
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts1⤵PID:1000
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
1KB
MD584ee42fe9a79a7eb9c9f96ab678af294
SHA162406990bcda0de8354575147aa07161be1ab194
SHA2561e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427
SHA51278ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710