Analysis

  • max time kernel
    70s
  • max time network
    61s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    12/10/2023, 00:59

General

  • Target

    tmp.exe

  • Size

    5.4MB

  • MD5

    ac5a067a49c0347a26cb08dbf77f45b2

  • SHA1

    961323bf26e320183019c6a759373017fa1d1ec2

  • SHA256

    c89c74a42dc7e8ba62490a3f73f031caec9ec3579bc69d169abc2bfd2e3719d2

  • SHA512

    fecabc22397856af602384d99f017ecb2b3624d96ae6fcc95f34b860fcb8b4c94c6e957b120762499ea72de7ca9b0e628252196093ec12f57b176641b8c00d94

  • SSDEEP

    98304:cAWVhcggbXvZnyKbxK0UiIeYjRJFpFx9e+11:cHyLKN/eeRJpHv1

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 18 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:688
  • C:\Windows\system32\dwm.exe
    "dwm.exe"
    1⤵
      PID:316
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
      1⤵
        PID:952
      • C:\Windows\system32\svchost.exe
        C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
        1⤵
          PID:520
          • C:\Windows\system32\winlogon.exe
            winlogon.exe
            2⤵
              PID:620
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
            1⤵
              PID:1096
            • C:\Windows\Explorer.EXE
              C:\Windows\Explorer.EXE
              1⤵
                PID:3148
                • C:\Users\Admin\AppData\Local\Temp\tmp.exe
                  "C:\Users\Admin\AppData\Local\Temp\tmp.exe"
                  2⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Drops file in Drivers directory
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:4624
                • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                  C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2204
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:3696
                  • C:\Windows\System32\sc.exe
                    sc stop UsoSvc
                    3⤵
                    • Launches sc.exe
                    PID:3788
                  • C:\Windows\System32\sc.exe
                    sc stop WaaSMedicSvc
                    3⤵
                    • Launches sc.exe
                    PID:1964
                  • C:\Windows\System32\sc.exe
                    sc stop wuauserv
                    3⤵
                    • Launches sc.exe
                    PID:2112
                  • C:\Windows\System32\sc.exe
                    sc stop bits
                    3⤵
                    • Launches sc.exe
                    PID:2400
                  • C:\Windows\System32\sc.exe
                    sc stop dosvc
                    3⤵
                    • Launches sc.exe
                    PID:1828
                • C:\Windows\System32\cmd.exe
                  C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                  2⤵
                  • Suspicious use of WriteProcessMemory
                  PID:4280
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -hibernate-timeout-ac 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:3520
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -hibernate-timeout-dc 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:2604
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -standby-timeout-ac 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4300
                  • C:\Windows\System32\powercfg.exe
                    powercfg /x -standby-timeout-dc 0
                    3⤵
                    • Suspicious use of AdjustPrivilegeToken
                    PID:4772
                • C:\Windows\System32\dialer.exe
                  C:\Windows\System32\dialer.exe
                  2⤵
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:2540
                • C:\Windows\System32\schtasks.exe
                  C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"
                  2⤵
                    PID:3980
                  • C:\Windows\System32\schtasks.exe
                    C:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml"
                    2⤵
                    • Creates scheduled task(s)
                    PID:4128
                • C:\Windows\sysmon.exe
                  C:\Windows\sysmon.exe
                  1⤵
                    PID:2432
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                    1⤵
                      PID:1516
                    • C:\Windows\system32\svchost.exe
                      C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                      1⤵
                        PID:1452
                      • C:\Windows\System32\svchost.exe
                        C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                        1⤵
                          PID:1444
                        • C:\Windows\System32\svchost.exe
                          C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
                          1⤵
                            PID:1344
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                            1⤵
                              PID:1288
                            • C:\Windows\system32\svchost.exe
                              C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                              1⤵
                                PID:1236
                              • C:\Windows\system32\svchost.exe
                                C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
                                1⤵
                                  PID:1140
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                                  1⤵
                                    PID:1120
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
                                    1⤵
                                      PID:1088
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                      1⤵
                                        PID:1000

                                      Network

                                      MITRE ATT&CK Enterprise v15

                                      Replay Monitor

                                      Loading Replay Monitor...

                                      Downloads

                                      • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_du4ks0gd.hcv.ps1

                                        Filesize

                                        60B

                                        MD5

                                        d17fe0a3f47be24a6453e9ef58c94641

                                        SHA1

                                        6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                        SHA256

                                        96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                        SHA512

                                        5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                      • C:\Users\Admin\AppData\Local\Temp\iwzulyohcyoo.xml

                                        Filesize

                                        1KB

                                        MD5

                                        84ee42fe9a79a7eb9c9f96ab678af294

                                        SHA1

                                        62406990bcda0de8354575147aa07161be1ab194

                                        SHA256

                                        1e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427

                                        SHA512

                                        78ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710

                                      • memory/316-39-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/316-49-0x00000175B5320000-0x00000175B534B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/316-35-0x00000175B5320000-0x00000175B534B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/520-51-0x000001C880D20000-0x000001C880D4B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/520-44-0x000001C880D20000-0x000001C880D4B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/520-46-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/620-78-0x000001DB9A250000-0x000001DB9A27B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/620-23-0x000001DB9A220000-0x000001DB9A244000-memory.dmp

                                        Filesize

                                        144KB

                                      • memory/620-26-0x000001DB9A250000-0x000001DB9A27B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/620-29-0x00007FF9CAFCD000-0x00007FF9CAFCE000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/620-32-0x00007FF9CAFCF000-0x00007FF9CAFD0000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/688-40-0x0000022F68D30000-0x0000022F68D5B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/688-45-0x00007FF9CAFCF000-0x00007FF9CAFD0000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/688-43-0x00007FF9CAFCD000-0x00007FF9CAFCE000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/688-30-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/688-28-0x0000022F68D30000-0x0000022F68D5B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/952-34-0x00000278693D0000-0x00000278693FB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/952-48-0x00000278693D0000-0x00000278693FB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/952-50-0x00007FF9CAFCC000-0x00007FF9CAFCD000-memory.dmp

                                        Filesize

                                        4KB

                                      • memory/952-38-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1000-56-0x00000190DA930000-0x00000190DA95B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1000-58-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1000-83-0x00000190DA930000-0x00000190DA95B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1088-60-0x000002B677F20000-0x000002B677F4B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1088-62-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1088-91-0x000002B677F20000-0x000002B677F4B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1096-64-0x0000023CB6520000-0x0000023CB654B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1096-66-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1096-100-0x0000023CB6520000-0x0000023CB654B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1120-117-0x0000017495FD0000-0x0000017495FFB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1120-73-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1120-72-0x0000017495FD0000-0x0000017495FFB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1140-125-0x00000201EA780000-0x00000201EA7AB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1140-77-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1140-76-0x00000201EA780000-0x00000201EA7AB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1236-158-0x0000012148290000-0x00000121482BB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1236-84-0x0000012148290000-0x00000121482BB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1236-88-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1288-90-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1288-139-0x000002536BA00000-0x000002536BA2B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1288-87-0x000002536BA00000-0x000002536BA2B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1344-98-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1344-96-0x00000226297B0000-0x00000226297DB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1444-101-0x00007FF98AFB0000-0x00007FF98AFC0000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/1444-97-0x00000220D3D90000-0x00000220D3DBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1444-110-0x00000220D3D90000-0x00000220D3DBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1452-102-0x0000021EA5DA0000-0x0000021EA5DCB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1516-107-0x0000027C7C4A0000-0x0000027C7C4CB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1568-114-0x000001DFA6E90000-0x000001DFA6EBB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1604-120-0x000001DED9890000-0x000001DED98BB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1628-128-0x00000142652B0000-0x00000142652DB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1680-132-0x0000015AF8960000-0x0000015AF898B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1736-136-0x0000021286570000-0x000002128659B000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1816-148-0x00000162E0DD0000-0x00000162E0DFB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/1880-154-0x00000201AC7D0000-0x00000201AC7FB000-memory.dmp

                                        Filesize

                                        172KB

                                      • memory/2204-13-0x00000280AAE60000-0x00000280AAE70000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2204-14-0x00000280AAE60000-0x00000280AAE70000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2204-12-0x00000280AAE60000-0x00000280AAE70000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2204-11-0x00007FF9AB940000-0x00007FF9AC401000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/2204-18-0x00007FF9AB940000-0x00007FF9AC401000-memory.dmp

                                        Filesize

                                        10.8MB

                                      • memory/2204-10-0x00000280AC750000-0x00000280AC772000-memory.dmp

                                        Filesize

                                        136KB

                                      • memory/2204-16-0x00000280AAE60000-0x00000280AAE70000-memory.dmp

                                        Filesize

                                        64KB

                                      • memory/2540-22-0x00007FF9CAC40000-0x00007FF9CACFE000-memory.dmp

                                        Filesize

                                        760KB

                                      • memory/2540-21-0x00007FF9CAF30000-0x00007FF9CB125000-memory.dmp

                                        Filesize

                                        2.0MB

                                      • memory/4624-0-0x00007FF70DB80000-0x00007FF70E0E9000-memory.dmp

                                        Filesize

                                        5.4MB

                                      • memory/4624-36-0x00007FF70DB80000-0x00007FF70E0E9000-memory.dmp

                                        Filesize

                                        5.4MB

                                      • memory/4624-15-0x00007FF70DB80000-0x00007FF70E0E9000-memory.dmp

                                        Filesize

                                        5.4MB