Analysis
-
max time kernel
121s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
20/02/2024, 05:15
Static task
static1
Behavioral task
behavioral1
Sample
11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe
Resource
win10v2004-20231215-en
General
-
Target
11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe
-
Size
707KB
-
MD5
99e41abf752c282789b0159ceee0dc00
-
SHA1
8077d1d93fab469d38f7452245e49b9c7b0de4fc
-
SHA256
11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477
-
SHA512
a3b0e625ab96a040ec777d4f68182486bdc112e71dcb2582bb02de576beda687a2410d32abc7bd2b70447c98458573f58a145e02300178f83a1ccc0297480900
-
SSDEEP
12288:PSmPwRYnOELz89WJ+3XExp+LUX514Ua75hrLlOU72hQ14tdDWCbJi8nbWDfR2IH2:PSmP0Y74nExp+L6j4h7xOU72+1qdr0pT
Malware Config
Signatures
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1040 set thread context of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Program crash 1 IoCs
pid pid_target Process procid_target 2432 2548 WerFault.exe 34 -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2816 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 2668 powershell.exe 2808 powershell.exe 2548 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe Token: SeDebugPrivilege 2668 powershell.exe Token: SeDebugPrivilege 2808 powershell.exe -
Suspicious use of WriteProcessMemory 23 IoCs
description pid Process procid_target PID 1040 wrote to memory of 2808 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 28 PID 1040 wrote to memory of 2808 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 28 PID 1040 wrote to memory of 2808 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 28 PID 1040 wrote to memory of 2808 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 28 PID 1040 wrote to memory of 2668 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 30 PID 1040 wrote to memory of 2668 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 30 PID 1040 wrote to memory of 2668 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 30 PID 1040 wrote to memory of 2668 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 30 PID 1040 wrote to memory of 2816 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 32 PID 1040 wrote to memory of 2816 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 32 PID 1040 wrote to memory of 2816 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 32 PID 1040 wrote to memory of 2816 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 32 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 1040 wrote to memory of 2548 1040 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 34 PID 2548 wrote to memory of 2432 2548 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 35 PID 2548 wrote to memory of 2432 2548 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 35 PID 2548 wrote to memory of 2432 2548 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 35 PID 2548 wrote to memory of 2432 2548 11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe 35
Processes
-
C:\Users\Admin\AppData\Local\Temp\11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe"C:\Users\Admin\AppData\Local\Temp\11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe"1⤵
- Suspicious use of SetThreadContext
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1040 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2808
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\EvIChUgZDOyFJ.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2668
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\EvIChUgZDOyFJ" /XML "C:\Users\Admin\AppData\Local\Temp\tmp83DF.tmp"2⤵
- Creates scheduled task(s)
PID:2816
-
-
C:\Users\Admin\AppData\Local\Temp\11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe"C:\Users\Admin\AppData\Local\Temp\11e6ab62f510d436211942941718cf7ae1efc83653b74f87722799b51eac4477.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2548 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 363⤵
- Program crash
PID:2432
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD50334bcc7b3d2858010e96a0fcdfb5afe
SHA1ad8385edffb5155cebe64739d863c95b3bc64a00
SHA2567312ed60fc344f955c0a8cb94dd1038ec6c92e4753b644d295a5025212176a20
SHA5129d37035f3f060667a9715aa8a92c4fdf6595ca37df3445ee64ac9883f7e3b0afb036ad559f9d6e6000a9bd212f086390b02a431b15ffb2127b434a83b7d0f90f
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\d93f411851d7c929.customDestinations-ms
Filesize7KB
MD5b0463f918575e26fe5564b2d8fc7b340
SHA113dc90eb2b101ef79f28589eb6aac166d472c527
SHA256d70314ba32cc3b5b21e9a15cc327d5f35ef56b8db81448bbb8a56ec2c67dd4de
SHA51232343b68a3f49ed448b3d4269ff4954982175a099bbe25a86d75513eb961b6c0108d8fdeaa53adbd866950e8ebf1d26cfc8d6dbfdd2db90e067d5c0e9ff58cdc