Analysis
-
max time kernel
122s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/02/2024, 05:17
Static task
static1
Behavioral task
behavioral1
Sample
15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
Resource
win10v2004-20240226-en
General
-
Target
15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe
-
Size
751KB
-
MD5
8a7ea7ff5e5cce2ca107a23aeb40b4e3
-
SHA1
0fe3cc81e2d4f294d80a8428783a72eb8cd82c6e
-
SHA256
15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef
-
SHA512
37d3e30a2f82484ece8040ac334369bad247b0cbb7c0326f31b046e2f5203823e4ba7c962b1cf2431fa357f07c1e53fff5848aaa88241a8e623d89637d427ab7
-
SSDEEP
12288:C8S+oGOKcbWAL9bW9ezgqZDKogif+UPJsXf4vIUeVfvGMbvk1RsXS38Mc14hhjwd:RAL9iyga+ogimUmXgRnMY1RRg8hcH
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1160 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 13 IoCs
pid Process 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 1668 powershell.exe 1612 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
description pid Process Token: SeDebugPrivilege 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe Token: SeDebugPrivilege 1668 powershell.exe Token: SeDebugPrivilege 1612 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2236 wrote to memory of 1612 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 30 PID 2236 wrote to memory of 1612 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 30 PID 2236 wrote to memory of 1612 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 30 PID 2236 wrote to memory of 1612 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 30 PID 2236 wrote to memory of 1668 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 32 PID 2236 wrote to memory of 1668 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 32 PID 2236 wrote to memory of 1668 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 32 PID 2236 wrote to memory of 1668 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 32 PID 2236 wrote to memory of 1160 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 34 PID 2236 wrote to memory of 1160 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 34 PID 2236 wrote to memory of 1160 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 34 PID 2236 wrote to memory of 1160 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 34 PID 2236 wrote to memory of 2004 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 36 PID 2236 wrote to memory of 2004 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 36 PID 2236 wrote to memory of 2004 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 36 PID 2236 wrote to memory of 2004 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 36 PID 2236 wrote to memory of 872 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 37 PID 2236 wrote to memory of 872 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 37 PID 2236 wrote to memory of 872 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 37 PID 2236 wrote to memory of 872 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 37 PID 2236 wrote to memory of 572 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 38 PID 2236 wrote to memory of 572 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 38 PID 2236 wrote to memory of 572 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 38 PID 2236 wrote to memory of 572 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 38 PID 2236 wrote to memory of 596 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 39 PID 2236 wrote to memory of 596 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 39 PID 2236 wrote to memory of 596 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 39 PID 2236 wrote to memory of 596 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 39 PID 2236 wrote to memory of 704 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 40 PID 2236 wrote to memory of 704 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 40 PID 2236 wrote to memory of 704 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 40 PID 2236 wrote to memory of 704 2236 15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2236 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\WEvGPrV.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1668
-
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\WEvGPrV" /XML "C:\Users\Admin\AppData\Local\Temp\tmp89E8.tmp"2⤵
- Creates scheduled task(s)
PID:1160
-
-
C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"2⤵PID:2004
-
-
C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"2⤵PID:872
-
-
C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"2⤵PID:572
-
-
C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"2⤵PID:596
-
-
C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"C:\Users\Admin\AppData\Local\Temp\15bee5f27c8e807fca30b704600b5f4ffa67a5fa80d51bb444c42d52c9020cef.exe"2⤵PID:704
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD5ea4ee16e41ad03c5be9d99033b60d101
SHA130fa0c1155c02b53d44dcbbe865e150dd7eff1b6
SHA25634e6ccbd838b5ba3263696dc33c3c7d2f500e3a966bbc32020015d6a9ae5307f
SHA51279fb10575cd97ce3455d0e66b645fe37722c54cce31a04853ff25a5e9772fb198e4e005aeb60f33790c7fa1b27d2ad115c5a7023f816f8b3f178a3d00d1d7ef6
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\CVUF2FHUEZU1OFSLJC1T.temp
Filesize7KB
MD5a5326d944fa44a487197587740e55c60
SHA117769098b48baef005c296690aefb4d50e21ffa4
SHA2561da955b9e2cf58e4292806e83df6a48fd3a7dcb6cd101ce7e789b54556db29cb
SHA51279be20e77938a19edaba5e6999b32d5d51f4aadce2f6e1b134a5f2e3ae2ea3d51e65a9b91f045cd40a752ae385ce436ce0166be896c7d202e2485769f70ba4a0