Analysis
-
max time kernel
52s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
31/12/2023, 02:18
Static task
static1
Behavioral task
behavioral1
Sample
24422184db43fd779e227e4d21e489fe.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
24422184db43fd779e227e4d21e489fe.exe
Resource
win10v2004-20231215-en
General
-
Target
24422184db43fd779e227e4d21e489fe.exe
-
Size
884KB
-
MD5
24422184db43fd779e227e4d21e489fe
-
SHA1
6aac1719618869770cd71f85ae161e4f1ca6a9e8
-
SHA256
4dc0f3c87c3f3e3591aa149efd03efa5092da748b1a8f99dbdbb990106977ba4
-
SHA512
8eeea57733dee1cf0a395877fce51b1d138e09cc28813d76e94607ca5c916ae00d45eba2aaafcc4e3be1a7d1be343c5953ed5266aef44a3b0150aca38075a49d
-
SSDEEP
24576:E4oR6qg4yUS9p78HONmNt0jc+NBEbMn8:ErsMip78uNmDoBEbM
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2836 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\24422184db43fd779e227e4d21e489fe.exe"C:\Users\Admin\AppData\Local\Temp\24422184db43fd779e227e4d21e489fe.exe"1⤵PID:4620
-
C:\Users\Admin\AppData\Local\Temp\24422184db43fd779e227e4d21e489fe.exe"C:\Users\Admin\AppData\Local\Temp\24422184db43fd779e227e4d21e489fe.exe"2⤵PID:3268
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pFVyJt.exe"2⤵PID:3904
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\pFVyJt" /XML "C:\Users\Admin\AppData\Local\Temp\tmpF3D.tmp"2⤵
- Creates scheduled task(s)
PID:2836
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\pFVyJt.exe"2⤵PID:956
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\24422184db43fd779e227e4d21e489fe.exe"2⤵PID:3692
-