Analysis
-
max time kernel
118s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231201-en -
resource tags
arch:x64arch:x86image:win7-20231201-enlocale:en-usos:windows7-x64system -
submitted
11-12-2023 22:40
Static task
static1
Behavioral task
behavioral1
Sample
e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe
Resource
win7-20231201-en
Behavioral task
behavioral2
Sample
e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe
Resource
win10v2004-20231130-en
General
-
Target
e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe
-
Size
2.1MB
-
MD5
141fab15a9ee48b8caadd462553dbff3
-
SHA1
36797395bb85f08ac5cf7eacb81c8d9ce78b3701
-
SHA256
e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454
-
SHA512
67ff417f350ba875ea4af66088e7bd9f91ee39c52ff4ad27b34526a506efbeb1a14258cca39762d87d8f98f0c6b8427ecc784fc9df4fade95d0f2b3bf86be6ca
-
SSDEEP
49152:KFMqbjBFzfnVMDpUFvPnA4UCV1a56xd/BOEZb8v/:4M2NVfVMDpUFvmczxB4A
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 5 IoCs
pid Process 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe -
Suspicious use of WriteProcessMemory 24 IoCs
description pid Process procid_target PID 2516 wrote to memory of 2860 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 28 PID 2516 wrote to memory of 2860 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 28 PID 2516 wrote to memory of 2860 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 28 PID 2516 wrote to memory of 2860 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 28 PID 2516 wrote to memory of 2692 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 30 PID 2516 wrote to memory of 2692 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 30 PID 2516 wrote to memory of 2692 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 30 PID 2516 wrote to memory of 2692 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 30 PID 2516 wrote to memory of 2884 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 31 PID 2516 wrote to memory of 2884 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 31 PID 2516 wrote to memory of 2884 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 31 PID 2516 wrote to memory of 2884 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 31 PID 2516 wrote to memory of 2616 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 32 PID 2516 wrote to memory of 2616 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 32 PID 2516 wrote to memory of 2616 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 32 PID 2516 wrote to memory of 2616 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 32 PID 2516 wrote to memory of 2904 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 33 PID 2516 wrote to memory of 2904 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 33 PID 2516 wrote to memory of 2904 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 33 PID 2516 wrote to memory of 2904 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 33 PID 2516 wrote to memory of 2876 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 34 PID 2516 wrote to memory of 2876 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 34 PID 2516 wrote to memory of 2876 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 34 PID 2516 wrote to memory of 2876 2516 e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\SRLHjykjP" /XML "C:\Users\Admin\AppData\Local\Temp\tmp6E6C.tmp"2⤵
- Creates scheduled task(s)
PID:2860
-
-
C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"{path}"2⤵PID:2692
-
-
C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"{path}"2⤵PID:2884
-
-
C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"{path}"2⤵PID:2616
-
-
C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"{path}"2⤵PID:2904
-
-
C:\Users\Admin\AppData\Local\Temp\e5fa8e9899e8d56149452a34fc6bc6b66bd9c8d69a31cdb1fbf5a90e9db6a454.exe"{path}"2⤵PID:2876
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50b52dba0ee6fa2594e8072459c42061f
SHA1e32832c3405c23e4f413f702685bc6995625f1bb
SHA256be317588c4995239f0e119cf2fccbe50101f59fafc43d8634be0aae151384cf5
SHA5124b516ebee4550cbbe9179c37af4fbf9f860ca03f5f2860578c76e7a9fc2ab9bbae475300956fa4cf63a8b7f77e0eb5ee911d057ce80a4b188a8136995328f1ed