Analysis
-
max time kernel
0s -
max time network
43s -
platform
windows10-2004_x64 -
resource
win10v2004-20231215-en -
resource tags
arch:x64arch:x86image:win10v2004-20231215-enlocale:en-usos:windows10-2004-x64system -
submitted
08/01/2024, 21:35
Static task
static1
Behavioral task
behavioral1
Sample
e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe
Resource
win10v2004-20231215-en
General
-
Target
e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe
-
Size
1.9MB
-
MD5
669830989c388ee7690a4e15827ef078
-
SHA1
c5689547cda605f9446c78c1e4e3a836506726f1
-
SHA256
e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c
-
SHA512
547b9dc2be7698a2a9590ffba85e9a576ff21d40fae8fbde00c73ec20e11cc748ad528419fbd5d05e56a8f1d2b671ccee88366b59797d8b44b1f709705ab9b5a
-
SSDEEP
49152:/oUJf8XbG9wioXZlhRhBkJuz7Hn3vpqAFOFvMoXW6YTt1JdD:/oUhuflRBqtvXlYTLD
Malware Config
Signatures
-
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1652 schtasks.exe 404 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 1428 powershell.exe 1428 powershell.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1428 powershell.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 5080 wrote to memory of 4808 5080 e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe 91 PID 5080 wrote to memory of 4808 5080 e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe 91 PID 4808 wrote to memory of 1428 4808 cmd.exe 89 PID 4808 wrote to memory of 1428 4808 cmd.exe 89 PID 4808 wrote to memory of 2824 4808 cmd.exe 114 PID 4808 wrote to memory of 2824 4808 cmd.exe 114
Processes
-
C:\Users\Admin\AppData\Local\Temp\e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe"C:\Users\Admin\AppData\Local\Temp\e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:5080 -
C:\Windows\SYSTEM32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit2⤵
- Suspicious use of WriteProcessMemory
PID:4808 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'3⤵PID:2824
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'3⤵PID:916
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'3⤵PID:2584
-
-
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe"2⤵PID:3332
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1428
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "dlllhost" /tr '"C:\Windows\system32\dlllhost.exe"'1⤵
- Creates scheduled task(s)
PID:1652
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "dlllhost" /tr '"C:\Windows\system32\dlllhost.exe"' & exit1⤵PID:4252
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Users\Admin\AppData\Local\Temp\e4ba43dc277e470e668df7507af2bdb30c7bca40393e5f76a096408f1e04cb5c.exe"1⤵PID:4224
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"2⤵PID:4736
-
-
C:\Windows\system32\dlllhost.exe"C:\Windows\system32\dlllhost.exe"2⤵PID:3732
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c C:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\dlllhost.exe"3⤵PID:5092
-
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin'1⤵PID:4924
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:1268
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Roaming'1⤵PID:2124
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Users\Admin\AppData\Local\Temp'1⤵PID:2824
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -Command Add-MpPreference -ExclusionPath 'C:\Windows'1⤵PID:3416
-
C:\Windows\system32\cmd.exe"cmd" /c powershell -Command Add-MpPreference -ExclusionPath '%UserProfile%' & powershell -Command Add-MpPreference -ExclusionPath '%AppData%' & powershell -Command Add-MpPreference -ExclusionPath '%Temp%' & powershell -Command Add-MpPreference -ExclusionPath '%SystemRoot%' & exit1⤵PID:4132
-
C:\Windows\system32\schtasks.exeschtasks /create /f /sc onlogon /rl highest /tn "dlllhost" /tr '"C:\Windows\system32\dlllhost.exe"'1⤵
- Creates scheduled task(s)
PID:404
-
C:\Windows\system32\choice.exechoice /C Y /N /D Y /T 31⤵PID:4332
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C choice /C Y /N /D Y /T 3 & Del "C:\Users\Admin\AppData\Local\Temp\svchost32.exe"1⤵PID:4408
-
C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"C:\Windows\system32\Microsoft\Telemetry\sihost32.exe"1⤵PID:4324
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /c schtasks /create /f /sc onlogon /rl highest /tn "dlllhost" /tr '"C:\Windows\system32\dlllhost.exe"' & exit1⤵PID:3780
-
C:\Users\Admin\AppData\Local\Temp\svchost32.exeC:\Users\Admin\AppData\Local\Temp\svchost32.exe "C:\Windows\system32\dlllhost.exe"1⤵PID:3364
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD5d85ba6ff808d9e5444a4b369f5bc2730
SHA131aa9d96590fff6981b315e0b391b575e4c0804a
SHA25684739c608a73509419748e4e20e6cc4e1846056c3fe1929a8300d5a1a488202f
SHA5128c414eb55b45212af385accc16d9d562adba2123583ce70d22b91161fe878683845512a78f04dedd4ea98ed9b174dbfa98cf696370598ad8e6fbd1e714f1f249
-
Filesize
539B
MD5b245679121623b152bea5562c173ba11
SHA147cb7fc4cf67e29a87016a7308cdb8b1b4dc8e3d
SHA25673d84fd03e38f1bbf8b2218f8a454f0879051855252fc76b63f20f46e7fd877f
SHA51275e46843b1eafcc7dc4362630838895b7f399e57662a12bf0305a912c8e726b02e0a760b1b97a2c262b2d05fdb944b9ed81c338ad93e5eb5cb57bc651602e42c
-
Filesize
944B
MD522310ad6749d8cc38284aa616efcd100
SHA1440ef4a0a53bfa7c83fe84326a1dff4326dcb515
SHA25655b1d8021c4eb4c3c0d75e3ed7a4eb30cd0123e3d69f32eeb596fe4ffec05abf
SHA5122ef08e2ee15bb86695fe0c10533014ffed76ececc6e579d299d3365fafb7627f53e32e600bb6d872b9f58aca94f8cb7e1e94cdfd14777527f7f0aa019d9c6def
-
Filesize
944B
MD5eb1ad317bd25b55b2bbdce8a28a74a94
SHA198a3978be4d10d62e7411946474579ee5bdc5ea6
SHA2569e94e7c9ac6134ee30e79498558aa1a5a1ac79a643666c3f8922eed215dd3a98
SHA512d011f266c0240d84470c0f9577cd9e4927309bd19bb38570ca9704ed8e1d159f9bea982a59d3eefef72ce7a10bd81208b82e88ef57c7af587f7437a89769adc0
-
Filesize
944B
MD5a7cc007980e419d553568a106210549a
SHA1c03099706b75071f36c3962fcc60a22f197711e0
SHA256a5735921fc72189c8bf577f3911486cf031708dc8d6bc764fe3e593c0a053165
SHA512b9aaf29403c467daef80a1ae87478afc33b78f4e1ca16189557011bb83cf9b3e29a0f85c69fa209c45201fb28baca47d31756eee07b79c6312c506e8370f7666
-
Filesize
944B
MD577d622bb1a5b250869a3238b9bc1402b
SHA1d47f4003c2554b9dfc4c16f22460b331886b191b
SHA256f97ff12a8abf4bf88bb6497bd2ac2da12628c8847a8ba5a9026bdbb76507cdfb
SHA512d6789b5499f23c9035375a102271e17a8a82e57d6f5312fa24242e08a83efdeb8becb7622f55c4cf1b89c7d864b445df11f4d994cf7e2f87a900535bcca12fd9
-
Filesize
944B
MD504f1d68afbed6b13399edfae1e9b1472
SHA18bfdcb687a995e4a63a8c32df2c66dc89f91a8b0
SHA256f358f33a42122e97c489fad7bbc8beab2eb42d42e4ec7fce0dd61fe6d8c0b8de
SHA51230c5e72a8134992094d937d2588f7a503b1d6407d11afe0265b7c8b0ce14071925e5caed13fc4f9c28705df4c7aed3601f81b007048b148af274d7784aa5fb75
-
Filesize
944B
MD5ba169f4dcbbf147fe78ef0061a95e83b
SHA192a571a6eef49fff666e0f62a3545bcd1cdcda67
SHA2565ef1421e19fde4bc03cd825dd7d6c0e7863f85fd8f0aa4a4d4f8d555dc7606d1
SHA5128d2e5e552210dcda684682538bc964fdd8a8ff5b24cc2cc8af813729f0202191f98eb42d38d2355df17ae620fe401aad6ceaedaed3b112fdacd32485a3a0c07c
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82
-
Filesize
28KB
MD5530d2604095bb0cddd87cf3aa961deb8
SHA14736c50d7cb08298d4d8532470e2a6acfb1feccd
SHA2564f3cd19f70ad4968af88788e298759fe0980062ab617ec89089026de3c4ea0da
SHA512e9a1999e46e621277817c4ea76ef85fa50c256e74168968bf73cca5cd39b7da0e8bfceb188cd5384b52c58a49b97e00a6afecf003fc48b3f2879bf26b3a7decf
-
Filesize
45KB
MD57ac59f9dedbc2c8d19700d71fa7cd56b
SHA1b2f965264d36da404a7035028b5218ce979a45cd
SHA256bcc022c3c95b3456c250f9484f8cba300ef4b53a6db158011fa93e8ff7ce4975
SHA512ee5426e5d95b43be6ee2b7676cf43273cb6ceb4d5473813aeeb1f38b5302bb56ac4898433ad56ebd93cbcd0fc1d9c1a47d8367670325309aab208d22bbcae828
-
Filesize
1KB
MD593c41a3dd34867399df396080c2dd3d2
SHA1d4f8fe64e05b85191683256ebd7e2e0fef2e6a13
SHA256c19acdb1b943a27e8730581404474235e5c28b4da06c0185cc70f9da04c4f52c
SHA5124243feb0ad647c6c93dab22bc9cbdafcd9b1fce96ee09cb88fabc1af7400ae728b7f5ba2ae6ec8a6bce61ea6706bec9c19a7c9e6489495462b62feaf168baf1c
-
Filesize
7KB
MD578cef23bd576b8d528a252f71a939c5a
SHA12228c11b300f516237788fe3ccb2bd24fe79fe99
SHA2567d176359cf00f2fd314f278720eea5c5cd9bf712f5c1da61ffe5d14b56caf803
SHA5121fa50e211b20674e4be7c43c1e028ba8d28d9e1425e845b849d33b71579451572a6a30579dc779593246fb9d84f604231e81b0c28311feb2b3770d60e258373b
-
Filesize
137KB
MD59eb17eef60b05d686237ebf4a6f720af
SHA124127dabbc09424ef53071418bc1a7749c26a069
SHA2565b97e4c729692f3e61023fcb87d64885b45caa4664a25faf4c05a82634971b5b
SHA5128dd1821461c0670fde01e538e3d5c7d524abc026cfdd5fad2db50f898f43868af313a9e2045564b8a152f42932a231ee128aec563ca0762e6eec1e6ea2da86b7
-
Filesize
38KB
MD5ccb3782a5bf5a284e322069975089568
SHA1d109e547fd616d2fc9476b7230dfb535a6ef475b
SHA256d337033b0c75847a7a42d1232e330e3c784f4964ed77f33d054d82b49f00459c
SHA512dd097f4afa883b2205b092385f003cc93cb96d4b75e4009943de3c553ed86c3339b6613c77d673585e4f8b3598525612ba731e0fb06af0e07e8d7d4c87ac2293
-
Filesize
92KB
MD51ec38c3b86c9b875717f2ee6344b072e
SHA1568aa95c94468eaa80f53c709461425c73f4cbd5
SHA256af0c467135786d394094b928dd9a717f75a27bbd4b4bb2446e514b6bfc13ad0a
SHA512a089e2ab639f160cd640d1ca74e2e21bba84cde3480489295c98ef32b7139514a28d60f43a3c617d07d5f7db4e93df81765162fecdb09b39f4e7ab6d81ea14c5