Analysis

  • max time kernel
    149s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    12/02/2024, 20:33

General

  • Target

    91ada2172edb442b453522ac008e274894c8c416d77bc3dbbaae99a3909063c8.exe

  • Size

    5.1MB

  • MD5

    33a22d1a45ad79c20194eaf0ec32c6ae

  • SHA1

    65980a4e05873df5ed0c2e4f0c92ee18989ab49e

  • SHA256

    91ada2172edb442b453522ac008e274894c8c416d77bc3dbbaae99a3909063c8

  • SHA512

    7cf92970947d83519c8395ce6dfca12034412a4271246799f5470cebd6deb9fadebe98f41b8964e5af48c2591bab94d27fb568b22f6620a921c73d987523c11e

  • SSDEEP

    98304:J7o9jzMHOhTMcwSCV7OMVS1Ol3DhGMEGgW/XwppMi:mNMuhQcwpOMFAGZji

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 17 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\91ada2172edb442b453522ac008e274894c8c416d77bc3dbbaae99a3909063c8.exe
    "C:\Users\Admin\AppData\Local\Temp\91ada2172edb442b453522ac008e274894c8c416d77bc3dbbaae99a3909063c8.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1696
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      powershell "" "schtasks /delete /tn * /f"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2120
      • C:\Windows\system32\schtasks.exe
        "C:\Windows\system32\schtasks.exe" /delete /tn * /f
        3⤵
          PID:2512
      • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
        powershell "" "SCHTASKS.exe /Create /SC ONSTART /TN AutoUpdateS /TR C:\Users\Admin\AppData\Roaming\AutoUpdateS.exe"
        2⤵
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2404
        • C:\Windows\system32\schtasks.exe
          "C:\Windows\system32\schtasks.exe" /Create /SC ONSTART /TN AutoUpdateS /TR C:\Users\Admin\AppData\Roaming\AutoUpdateS.exe
          3⤵
          • Creates scheduled task(s)
          PID:2876
      • C:\Program Files\7-Zip\7z.exe
        "C:\Program Files\7-Zip\7z.exe"
        2⤵
          PID:2288

      Network

      MITRE ATT&CK Enterprise v15

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms

        Filesize

        7KB

        MD5

        21a62b66bbf2d6d6d1888aa3fc803ea7

        SHA1

        d8ffb8adb8f8a7f520b41f5c3ddc79f0b94fecbc

        SHA256

        a2cc4c774ee28a5224d4b8ee0fef8b51f03faee65cf167767ae2b920a9406e9e

        SHA512

        2c906e245d5cfb56e3958926f253d0bc8cc2b650ce1170328e9aef7385c006a611f4763256fa7b6018547682a869375506b66a4799d4a90b9e5b89ea5228efcd

      • memory/1696-45-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-43-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-39-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-36-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-41-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-42-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-49-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-44-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-51-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-47-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-38-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-48-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-50-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/1696-46-0x000000013FF20000-0x000000014048E000-memory.dmp

        Filesize

        5.4MB

      • memory/2120-9-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB

      • memory/2120-8-0x00000000023E0000-0x00000000023E8000-memory.dmp

        Filesize

        32KB

      • memory/2120-14-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB

      • memory/2120-7-0x000000001B2F0000-0x000000001B5D2000-memory.dmp

        Filesize

        2.9MB

      • memory/2120-13-0x00000000027A0000-0x0000000002820000-memory.dmp

        Filesize

        512KB

      • memory/2120-12-0x00000000027A0000-0x0000000002820000-memory.dmp

        Filesize

        512KB

      • memory/2120-11-0x000007FEF5110000-0x000007FEF5AAD000-memory.dmp

        Filesize

        9.6MB

      • memory/2120-10-0x00000000027A0000-0x0000000002820000-memory.dmp

        Filesize

        512KB

      • memory/2288-31-0x0000000000160000-0x000000000044F000-memory.dmp

        Filesize

        2.9MB

      • memory/2288-37-0x0000000000160000-0x000000000044F000-memory.dmp

        Filesize

        2.9MB

      • memory/2288-40-0x0000000000160000-0x000000000044F000-memory.dmp

        Filesize

        2.9MB

      • memory/2288-35-0x0000000000160000-0x000000000044F000-memory.dmp

        Filesize

        2.9MB

      • memory/2288-32-0x000007FFFFFD9000-0x000007FFFFFDA000-memory.dmp

        Filesize

        4KB

      • memory/2288-30-0x0000000000160000-0x000000000044F000-memory.dmp

        Filesize

        2.9MB

      • memory/2404-29-0x000007FEF4770000-0x000007FEF510D000-memory.dmp

        Filesize

        9.6MB

      • memory/2404-28-0x00000000027D0000-0x0000000002850000-memory.dmp

        Filesize

        512KB

      • memory/2404-25-0x000007FEF4770000-0x000007FEF510D000-memory.dmp

        Filesize

        9.6MB

      • memory/2404-20-0x000000001B370000-0x000000001B652000-memory.dmp

        Filesize

        2.9MB

      • memory/2404-24-0x00000000027D0000-0x0000000002850000-memory.dmp

        Filesize

        512KB

      • memory/2404-22-0x0000000002390000-0x0000000002398000-memory.dmp

        Filesize

        32KB

      • memory/2404-23-0x00000000027D0000-0x0000000002850000-memory.dmp

        Filesize

        512KB

      • memory/2404-21-0x000007FEF4770000-0x000007FEF510D000-memory.dmp

        Filesize

        9.6MB