Analysis
-
max time kernel
150s -
max time network
117s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
23/02/2024, 22:36
Static task
static1
Behavioral task
behavioral1
Sample
a0839462a8537c521cca37c5365ca703.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
a0839462a8537c521cca37c5365ca703.exe
Resource
win10v2004-20240221-en
General
-
Target
a0839462a8537c521cca37c5365ca703.exe
-
Size
3.7MB
-
MD5
a0839462a8537c521cca37c5365ca703
-
SHA1
3a2fa7467655dcc338dfd6d8f444a5dd6c60bda0
-
SHA256
5724ffd28f7e5deea1e05d8e78d5616f2a8e289884a924537abcb93b7e9fe269
-
SHA512
df1b146ec1d96fd27cc965baa093e3bb86b48b4962fb9b6b651e4a1589531a7051c37adb07810cf2f20edb5cf72da65792d755a6353b70b0ffcf06a834355252
-
SSDEEP
98304:qx9vjTfAP10s9RamcXhGRQtqBK0vI9ewgUtO2209FjVAX:IIP10syHYqoBK0A9eMO2/fVAX
Malware Config
Signatures
-
Stops running service(s) 3 TTPs
-
Uses Session Manager for persistence 2 TTPs 3 IoCs
Creates Session Manager registry key to run executable early in system boot.
description ioc Process Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet002\Control\Session manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe Set value (data) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\Session Manager\BootExecute = 6100750074006f0063006800650063006b0020006100750074006f00630068006b0020002a0000000000 reg.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\WOW6432Node\Microsoft\Windows\CurrentVersion\Run\win = "C:\\win.exe" a0839462a8537c521cca37c5365ca703.exe -
Launches sc.exe 1 IoCs
Sc.exe is a Windows utlilty to control services on the system.
pid Process 2108 sc.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 3668 schtasks.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 4100 a0839462a8537c521cca37c5365ca703.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 4100 wrote to memory of 3668 4100 a0839462a8537c521cca37c5365ca703.exe 86 PID 4100 wrote to memory of 3668 4100 a0839462a8537c521cca37c5365ca703.exe 86 PID 4100 wrote to memory of 3668 4100 a0839462a8537c521cca37c5365ca703.exe 86 PID 4100 wrote to memory of 2108 4100 a0839462a8537c521cca37c5365ca703.exe 87 PID 4100 wrote to memory of 2108 4100 a0839462a8537c521cca37c5365ca703.exe 87 PID 4100 wrote to memory of 2108 4100 a0839462a8537c521cca37c5365ca703.exe 87 PID 4100 wrote to memory of 5028 4100 a0839462a8537c521cca37c5365ca703.exe 88 PID 4100 wrote to memory of 5028 4100 a0839462a8537c521cca37c5365ca703.exe 88 PID 4100 wrote to memory of 5028 4100 a0839462a8537c521cca37c5365ca703.exe 88 PID 4100 wrote to memory of 3640 4100 a0839462a8537c521cca37c5365ca703.exe 90 PID 4100 wrote to memory of 3640 4100 a0839462a8537c521cca37c5365ca703.exe 90 PID 4100 wrote to memory of 3640 4100 a0839462a8537c521cca37c5365ca703.exe 90 PID 4100 wrote to memory of 1004 4100 a0839462a8537c521cca37c5365ca703.exe 89 PID 4100 wrote to memory of 1004 4100 a0839462a8537c521cca37c5365ca703.exe 89 PID 4100 wrote to memory of 1004 4100 a0839462a8537c521cca37c5365ca703.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\a0839462a8537c521cca37c5365ca703.exe"C:\Users\Admin\AppData\Local\Temp\a0839462a8537c521cca37c5365ca703.exe"1⤵
- Adds Run key to start application
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of WriteProcessMemory
PID:4100 -
C:\Windows\SysWOW64\schtasks.exeschtasks /create /tn startt /tr c:\autoexec.bat /sc onstart /ru system2⤵
- Creates scheduled task(s)
PID:3668
-
-
C:\Windows\SysWOW64\sc.exesc delete GbpSv2⤵
- Launches sc.exe
PID:2108
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet001\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:5028
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\CurrentControlSet\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:1004
-
-
C:\Windows\SysWOW64\reg.exereg add "HKLM\SYSTEM\ControlSet002\Control\Session manager" /v BootExecute /t REG_MULTI_SZ /d "autocheck autochk *" /f2⤵
- Uses Session Manager for persistence
PID:3640
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
2Registry Run Keys / Startup Folder
2Create or Modify System Process
1Windows Service
1Scheduled Task/Job
1