Analysis
-
max time kernel
145s -
max time network
148s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 03:40
Behavioral task
behavioral1
Sample
42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe
Resource
win7-20231129-en
General
-
Target
42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe
-
Size
203KB
-
MD5
cad2e56e0f6f490b74884f3d0237b37f
-
SHA1
dbdf46ab3af70b281439adc47a240e15915ab137
-
SHA256
42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe
-
SHA512
3139fea1eb36e5149e827ba7eace7f8c1b56e44ba459546e72c8a98e726b4f58e543bedfd282b646af0a20d28738ca934ce4052bb758d2f23d809aed822da269
-
SSDEEP
3072:MzEqV6B1jHa6dtJ10jgvzcgi+oG/j9iaMP2s/HII0svu1SEImfAF8V7m8CJvflRg:MLV6Bta6dtJmakIM59uvImfVqflRj0v3
Malware Config
Signatures
-
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows\CurrentVersion\Run\WAN Manager = "C:\\Program Files (x86)\\WAN Manager\\wanmgr.exe" 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe -
Drops file in Program Files directory 2 IoCs
description ioc Process File created C:\Program Files (x86)\WAN Manager\wanmgr.exe 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe File opened for modification C:\Program Files (x86)\WAN Manager\wanmgr.exe 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe -
Creates scheduled task(s) 1 TTPs 2 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2300 schtasks.exe 860 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2888 wrote to memory of 2300 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 28 PID 2888 wrote to memory of 2300 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 28 PID 2888 wrote to memory of 2300 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 28 PID 2888 wrote to memory of 2300 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 28 PID 2888 wrote to memory of 860 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 31 PID 2888 wrote to memory of 860 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 31 PID 2888 wrote to memory of 860 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 31 PID 2888 wrote to memory of 860 2888 42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe 31
Processes
-
C:\Users\Admin\AppData\Local\Temp\42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe"C:\Users\Admin\AppData\Local\Temp\42c3d510fa655fa4f20163b69172a6dff1e990e8630fa465c4cb01c47f50cefe.exe"1⤵
- Adds Run key to start application
- Checks whether UAC is enabled
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WAN Manager" /xml "C:\Users\Admin\AppData\Local\Temp\tmp85A.tmp"2⤵
- Creates scheduled task(s)
PID:2300
-
-
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /create /f /tn "WAN Manager Task" /xml "C:\Users\Admin\AppData\Local\Temp\tmp907.tmp"2⤵
- Creates scheduled task(s)
PID:860
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD520e9fac12601092c07a517e8dde6d6dc
SHA14c563048208f6e98456f6405b246ca5c04f1ccf9
SHA256ba37d3b467c6363860ce132a3b3f8f0ea39cb9f50d6c0100d940bf87a77dbbc0
SHA5125f16e07f192d909c36599b3f34bf349d735722eec8f3d1158344827ef62e6ba68a39700744d5458611c3910b453ed411d0357e7c29dcb963f53e7c86c18bf13a
-
Filesize
1KB
MD5f3cda3e6bab1951e8d59c3eb775a14c6
SHA1434c1ec851a45c0505fd8fd28159f549e2e9adfd
SHA256067d3f5167cab2ea4e76f59386df4eaf49c6008f6451e1971274a938ad7bcf44
SHA512bc79446e4e0204c04abcacef6799aeafe7915c1a5c6bdb3573ba40370d6a6a1e2590eb6315151d12a9447970f993a17463442c5dc0ba97c58df17dddfd73d62c