Analysis
-
max time kernel
104s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
01-01-2024 00:39
Static task
static1
Behavioral task
behavioral1
Sample
3b7952b29980779fe69f90ebc56b39ac.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b7952b29980779fe69f90ebc56b39ac.exe
Resource
win10v2004-20231215-en
General
-
Target
3b7952b29980779fe69f90ebc56b39ac.exe
-
Size
7.1MB
-
MD5
3b7952b29980779fe69f90ebc56b39ac
-
SHA1
aea379258d2b742954f87fb09297437129be83e0
-
SHA256
0b368ceedd88f3d520acf7d03f6a8b00d6edc97f6b336e3a0ca6729b36a2a096
-
SHA512
69c3bad648de36a6141bf59eecb57a6905e02f76e348ff8c1ed012164688df9d91301b0fb855bae15b12ce44720c980cd39181046c382b467bc6ddfd33d67275
-
SSDEEP
98304:0g+HCvkRk5zvfpfuFAcUs4tmGqtLG6YhXp0zpTK6skwdKimkqW8NmPQEC39qs+Qb:GkkRkdvfp2TJGmZpPiG9EgDU
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4324 schtasks.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"1⤵PID:1192
-
C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"2⤵PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"2⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"2⤵PID:1432
-
-
C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"2⤵PID:4820
-
-
C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"2⤵PID:1488
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yocHewonEtYr.exe"2⤵PID:736
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\yocHewonEtYr" /XML "C:\Users\Admin\AppData\Local\Temp\tmpED59.tmp"2⤵
- Creates scheduled task(s)
PID:4324
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\yocHewonEtYr.exe"2⤵PID:3416
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\3b7952b29980779fe69f90ebc56b39ac.exe"2⤵PID:2752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5968cb9309758126772781b83adb8a28f
SHA18da30e71accf186b2ba11da1797cf67f8f78b47c
SHA25692099c10776bb7e3f2a8d1b82d4d40d0c4627e4f1bf754a6e58dfd2c2e97042a
SHA5124bd50732f8af4d688d95999bddfd296115d7033ddc38f86c9fb1f47fde202bffa27e9088bebcaa3064ca946af2f5c1ca6cbde49d0907f0005c7ab42874515dd3
-
Filesize
18KB
MD5c22508b88847c859af364f54fc752ff9
SHA111e1016d5370c9e59e4dc4c55d300cb6bd6d44f1
SHA25612d5f34e8154f46552a7f8364f146838158078e1e6f9c41a1fe7b3f6a32d038a
SHA512de509f343266cdc8c33ef0089d97e9d375a63d5530bf787fd3bde1e4852f7f06f024885726ed47489db0ff8ee490931145044c419b0b34eaf4f11c0e621b3b0b