Analysis
-
max time kernel
119s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
26-12-2023 03:06
Static task
static1
Behavioral task
behavioral1
Sample
4ee1fe5a7eae87277c898e6c98757e18.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
4ee1fe5a7eae87277c898e6c98757e18.exe
Resource
win10v2004-20231215-en
General
-
Target
4ee1fe5a7eae87277c898e6c98757e18.exe
-
Size
629KB
-
MD5
4ee1fe5a7eae87277c898e6c98757e18
-
SHA1
a39f79d4ed22968ff8c447ea31e532b2fac918f6
-
SHA256
e6fb06214233bf43c1288b9e491753e2382beaaf170dd27e80a20d19f0273add
-
SHA512
ce8d99b5e32463628a618c47a7871515d3c068c9cc97411c2b98e7d3109973d33af134d6a56a5cc4ae6553aafd2283f14f0bf2bc48f569ef4a4864a3fdbc9c1c
-
SSDEEP
12288:wMutR5FemXj/0yN2zISiwKJGwjYI+HiF0N76lKdA3sPxDQoa:USYQyAcSbppN76QdA3sPxDQoa
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
pid Process 2672 MicrosoftApi.exe 1984 MicrosoftApi.exe -
Loads dropped DLL 1 IoCs
pid Process 1712 4ee1fe5a7eae87277c898e6c98757e18.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2972 schtasks.exe -
Delays execution with timeout.exe 1 IoCs
pid Process 2504 timeout.exe -
Suspicious behavior: EnumeratesProcesses 64 IoCs
pid Process 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe 1984 MicrosoftApi.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1984 MicrosoftApi.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 1712 wrote to memory of 2672 1712 4ee1fe5a7eae87277c898e6c98757e18.exe 29 PID 1712 wrote to memory of 2672 1712 4ee1fe5a7eae87277c898e6c98757e18.exe 29 PID 1712 wrote to memory of 2672 1712 4ee1fe5a7eae87277c898e6c98757e18.exe 29 PID 2672 wrote to memory of 2480 2672 MicrosoftApi.exe 30 PID 2672 wrote to memory of 2480 2672 MicrosoftApi.exe 30 PID 2672 wrote to memory of 2480 2672 MicrosoftApi.exe 30 PID 2480 wrote to memory of 2504 2480 cmd.exe 32 PID 2480 wrote to memory of 2504 2480 cmd.exe 32 PID 2480 wrote to memory of 2504 2480 cmd.exe 32 PID 2480 wrote to memory of 2972 2480 cmd.exe 33 PID 2480 wrote to memory of 2972 2480 cmd.exe 33 PID 2480 wrote to memory of 2972 2480 cmd.exe 33 PID 1968 wrote to memory of 1984 1968 taskeng.exe 37 PID 1968 wrote to memory of 1984 1968 taskeng.exe 37 PID 1968 wrote to memory of 1984 1968 taskeng.exe 37 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\4ee1fe5a7eae87277c898e6c98757e18.exe"C:\Users\Admin\AppData\Local\Temp\4ee1fe5a7eae87277c898e6c98757e18.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1712 -
C:\Users\Admin\AppData\Roaming\ServiceApi\MicrosoftApi.exe"C:\Users\Admin\AppData\Roaming\ServiceApi\MicrosoftApi.exe"2⤵
- Executes dropped EXE
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Windows\system32\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp901F.tmp.cmd""3⤵
- Suspicious use of WriteProcessMemory
PID:2480 -
C:\Windows\system32\timeout.exetimeout 44⤵
- Delays execution with timeout.exe
PID:2504
-
-
C:\Windows\system32\schtasks.exeschtasks.exe /create /f /sc MINUTE /mo 1 /tn "MicrosoftApi" /tr "'C:\Users\Admin\AppData\Roaming\ServiceApi\MicrosoftApi.exe"'4⤵
- Creates scheduled task(s)
PID:2972
-
-
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F7EE3DBF-8B42-4207-AB7B-6B1F8F5C403C} S-1-5-21-3627615824-4061627003-3019543961-1000:SCFGBRBT\Admin:Interactive:[1]1⤵
- Suspicious use of WriteProcessMemory
PID:1968 -
C:\Users\Admin\AppData\Roaming\ServiceApi\MicrosoftApi.exeC:\Users\Admin\AppData\Roaming\ServiceApi\MicrosoftApi.exe2⤵
- Executes dropped EXE
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1984
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
258B
MD5b60bdda171291a5aa4a486e7c917d33a
SHA194338215169567dc2ea808d20a46e6ed7c946b80
SHA256d8d7a68cf4ccc89a701fd29e2af84a87ef863f7ea55ea0788265e8137c0fbf25
SHA512810ab8fd57afaca6f10c63dcb10d3968e8e12fc29759e76c1ce7f3bf6b1af05a1521ad82fb25ed707535a750a7641a561d53f00896505974a885ec10041919d8
-
Filesize
629KB
MD54ee1fe5a7eae87277c898e6c98757e18
SHA1a39f79d4ed22968ff8c447ea31e532b2fac918f6
SHA256e6fb06214233bf43c1288b9e491753e2382beaaf170dd27e80a20d19f0273add
SHA512ce8d99b5e32463628a618c47a7871515d3c068c9cc97411c2b98e7d3109973d33af134d6a56a5cc4ae6553aafd2283f14f0bf2bc48f569ef4a4864a3fdbc9c1c