Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
08/03/2024, 10:23
Static task
static1
Behavioral task
behavioral1
Sample
a.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
a.exe
Resource
win10v2004-20240226-en
General
-
Target
a.exe
-
Size
54KB
-
MD5
a362175bc3e9d2814bfd0d8f2a72c3aa
-
SHA1
f7a55e1c3a6122b8734a287867b77dc2955f5695
-
SHA256
d8597c5d4661eb00555da3acb472af112f3e640657a38ae49d8567f3b95d9c7c
-
SHA512
dd44dd7064ae0a78a4be169d2c10afb8504251ee1425ca3a41740162c3e29ab606f2832abab6cc11e9559c63d3c11d931c94888ea393c92b7466b38cbeda65d3
-
SSDEEP
1536:lsvUQEx3YyZa2XaosJpZeQZD/NPGbNSOL:lgULYX2XW3gQh4bNfL
Malware Config
Signatures
-
Drops file in System32 directory 2 IoCs
description ioc Process File opened for modification C:\Windows\SysWOW64\system core a.exe File opened for modification C:\Windows\SysWOW64\system core\a.exe a.exe -
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4496 schtasks.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 2208 tasklist.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 4260 a.exe Token: SeDebugPrivilege 2208 tasklist.exe -
Suspicious use of WriteProcessMemory 27 IoCs
description pid Process procid_target PID 4260 wrote to memory of 4496 4260 a.exe 95 PID 4260 wrote to memory of 4496 4260 a.exe 95 PID 4260 wrote to memory of 4496 4260 a.exe 95 PID 4260 wrote to memory of 4660 4260 a.exe 99 PID 4260 wrote to memory of 4660 4260 a.exe 99 PID 4260 wrote to memory of 4660 4260 a.exe 99 PID 4660 wrote to memory of 1716 4660 cmd.exe 101 PID 4660 wrote to memory of 1716 4660 cmd.exe 101 PID 4660 wrote to memory of 1716 4660 cmd.exe 101 PID 4260 wrote to memory of 3480 4260 a.exe 102 PID 4260 wrote to memory of 3480 4260 a.exe 102 PID 4260 wrote to memory of 3480 4260 a.exe 102 PID 3480 wrote to memory of 4432 3480 cmd.exe 104 PID 3480 wrote to memory of 4432 3480 cmd.exe 104 PID 3480 wrote to memory of 4432 3480 cmd.exe 104 PID 4260 wrote to memory of 3288 4260 a.exe 105 PID 4260 wrote to memory of 3288 4260 a.exe 105 PID 4260 wrote to memory of 3288 4260 a.exe 105 PID 3288 wrote to memory of 2208 3288 cmd.exe 107 PID 3288 wrote to memory of 2208 3288 cmd.exe 107 PID 3288 wrote to memory of 2208 3288 cmd.exe 107 PID 3288 wrote to memory of 2620 3288 cmd.exe 108 PID 3288 wrote to memory of 2620 3288 cmd.exe 108 PID 3288 wrote to memory of 2620 3288 cmd.exe 108 PID 3288 wrote to memory of 2536 3288 cmd.exe 109 PID 3288 wrote to memory of 2536 3288 cmd.exe 109 PID 3288 wrote to memory of 2536 3288 cmd.exe 109
Processes
-
C:\Users\Admin\AppData\Local\Temp\a.exe"C:\Users\Admin\AppData\Local\Temp\a.exe"1⤵
- Drops file in System32 directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4260 -
C:\Windows\SysWOW64\schtasks.exe"schtasks.exe" /Create /TN "Steam" /XML "C:\Users\Admin\AppData\Local\Temp\tmp469E.tmp" /F2⤵
- Creates scheduled task(s)
PID:4496
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc2⤵
- Suspicious use of WriteProcessMemory
PID:4660 -
C:\Windows\SysWOW64\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc3⤵PID:1716
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName2⤵
- Suspicious use of WriteProcessMemory
PID:3480 -
C:\Windows\SysWOW64\reg.exeREG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName3⤵PID:4432
-
-
-
C:\Windows\SysWOW64\cmd.exe"cmd.exe" /c TASKLIST /FI "STATUS eq RUNNING" | find /V "Image Name" | find /V "="2⤵
- Suspicious use of WriteProcessMemory
PID:3288 -
C:\Windows\SysWOW64\tasklist.exeTASKLIST /FI "STATUS eq RUNNING"3⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:2208
-
-
C:\Windows\SysWOW64\find.exefind /V "Image Name"3⤵PID:2620
-
-
C:\Windows\SysWOW64\find.exefind /V "="3⤵PID:2536
-
-
-
C:\Windows\System32\rundll32.exeC:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding1⤵PID:1788
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD53c2bd0bfa8854c70e70ab4e657adfb79
SHA177ae58a6b479308d631df6fef5f3100dedf3c36a
SHA25657a50372f67d4b8d1aed68e9bb30946c36ab2aa6dd56c6d3ed2d8d877c7fe858
SHA512dcaec3c80cff1e73cd523cc14ab117366f3649ed0a0b7548c90c962da6262137f41971bd3d858f47d0114ee9be46db14d6dec83aa426d9b2efc8b6ca9c9d1a4d