Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
25-02-2024 01:22
Behavioral task
behavioral1
Sample
2c0378fd61320cf9a69c353efeb9fd10.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
2c0378fd61320cf9a69c353efeb9fd10.exe
Resource
win10v2004-20240221-en
General
-
Target
2c0378fd61320cf9a69c353efeb9fd10.exe
-
Size
22.6MB
-
MD5
2c0378fd61320cf9a69c353efeb9fd10
-
SHA1
7b3fe765aacfa3c6c8113aae107c99b6120bdd2d
-
SHA256
604e6b511359e9d0a50fd6df5d39a5fe4f5f82ae30a0832566bfe77962466d97
-
SHA512
4f85a845a0bcf1dabfd8e520a03680784bcf101d53c1782b2122a289badf3723b274157246f61dcfc167d11f504f2301b601aae8179227a07e51ae34c25af850
-
SSDEEP
393216:+G251FGAsxevJZx3W0KaALRadLxlkux8Y++90R5R:+D1Ftp3txl8Y++90nR
Malware Config
Signatures
-
Drops file in Windows directory 5 IoCs
description ioc Process File opened for modification C:\Windows\ShellExperiences\security\syns.exe 2c0378fd61320cf9a69c353efeb9fd10.exe File created C:\Windows\ShellExperiences\security\install.zip 2c0378fd61320cf9a69c353efeb9fd10.exe File created C:\Windows\ShellExperiences\security\ScheduledDefrag.xml 2c0378fd61320cf9a69c353efeb9fd10.exe File opened for modification C:\Windows\ShellExperiences\security\ScheduledDefrag.xml 2c0378fd61320cf9a69c353efeb9fd10.exe File created C:\Windows\ShellExperiences\security\syns.exe 2c0378fd61320cf9a69c353efeb9fd10.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 2492 schtasks.exe -
Suspicious use of WriteProcessMemory 12 IoCs
description pid Process procid_target PID 2172 wrote to memory of 2604 2172 2c0378fd61320cf9a69c353efeb9fd10.exe 29 PID 2172 wrote to memory of 2604 2172 2c0378fd61320cf9a69c353efeb9fd10.exe 29 PID 2172 wrote to memory of 2604 2172 2c0378fd61320cf9a69c353efeb9fd10.exe 29 PID 2172 wrote to memory of 2636 2172 2c0378fd61320cf9a69c353efeb9fd10.exe 30 PID 2172 wrote to memory of 2636 2172 2c0378fd61320cf9a69c353efeb9fd10.exe 30 PID 2172 wrote to memory of 2636 2172 2c0378fd61320cf9a69c353efeb9fd10.exe 30 PID 2604 wrote to memory of 2540 2604 cmd.exe 33 PID 2604 wrote to memory of 2540 2604 cmd.exe 33 PID 2604 wrote to memory of 2540 2604 cmd.exe 33 PID 2636 wrote to memory of 2492 2636 cmd.exe 32 PID 2636 wrote to memory of 2492 2636 cmd.exe 32 PID 2636 wrote to memory of 2492 2636 cmd.exe 32 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\2c0378fd61320cf9a69c353efeb9fd10.exe"C:\Users\Admin\AppData\Local\Temp\2c0378fd61320cf9a69c353efeb9fd10.exe"1⤵
- Drops file in Windows directory
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Windows\system32\cmd.exe"cmd.exe" /c schtasks /delete /tn ""Microsoft\Windows\Bluetooth\ScheduledDefrag"" /f2⤵
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\system32\schtasks.exeschtasks /delete /tn ""Microsoft\Windows\Bluetooth\ScheduledDefrag"" /f3⤵PID:2540
-
-
-
C:\Windows\system32\cmd.exe"cmd.exe" /c schtasks /create /xml "C:\Windows\ShellExperiences\security\ScheduledDefrag.xml" /tn "Microsoft\Windows\Bluetooth\ScheduledDefrag" /RU SYSTEM2⤵
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Windows\system32\schtasks.exeschtasks /create /xml "C:\Windows\ShellExperiences\security\ScheduledDefrag.xml" /tn "Microsoft\Windows\Bluetooth\ScheduledDefrag" /RU SYSTEM3⤵
- Creates scheduled task(s)
PID:2492
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
5KB
MD56436ae27bc4eda6c83b96b097b91783a
SHA127996feb564fbcb59c1aba433fd1f86780a4e59f
SHA2560f1ed1fa5849b041d5328e4fd3e1a286235de643c7b7d2f67d9172eeb561d984
SHA5129cb91f6f69999658cd98c79b1b3ea88edc423eca8867818dcfe3109773af4a750b8255890244bce376aa0828f99c505ced13315e43c677033d67ed700649d472