Analysis

  • max time kernel
    149s
  • max time network
    151s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240226-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system
  • submitted
    08/03/2024, 10:23

General

  • Target

    a.exe

  • Size

    54KB

  • MD5

    a362175bc3e9d2814bfd0d8f2a72c3aa

  • SHA1

    f7a55e1c3a6122b8734a287867b77dc2955f5695

  • SHA256

    d8597c5d4661eb00555da3acb472af112f3e640657a38ae49d8567f3b95d9c7c

  • SHA512

    dd44dd7064ae0a78a4be169d2c10afb8504251ee1425ca3a41740162c3e29ab606f2832abab6cc11e9559c63d3c11d931c94888ea393c92b7466b38cbeda65d3

  • SSDEEP

    1536:lsvUQEx3YyZa2XaosJpZeQZD/NPGbNSOL:lgULYX2XW3gQh4bNfL

Score
5/10

Malware Config

Signatures

  • Drops file in System32 directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 27 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a.exe
    "C:\Users\Admin\AppData\Local\Temp\a.exe"
    1⤵
    • Drops file in System32 directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4260
    • C:\Windows\SysWOW64\schtasks.exe
      "schtasks.exe" /Create /TN "Steam" /XML "C:\Users\Admin\AppData\Local\Temp\tmp469E.tmp" /F
      2⤵
      • Creates scheduled task(s)
      PID:4496
    • C:\Windows\SysWOW64\cmd.exe
      "cmd.exe" /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:4660
      • C:\Windows\SysWOW64\reg.exe
        REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\DriverDesc
        3⤵
          PID:1716
      • C:\Windows\SysWOW64\cmd.exe
        "cmd.exe" /c REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:3480
        • C:\Windows\SysWOW64\reg.exe
          REG QUERY HKEY_LOCAL_MACHINE\SYSTEM\ControlSet001\Control\Class\{4D36E968-E325-11CE-BFC1-08002BE10318}\0000\ProviderName
          3⤵
            PID:4432
        • C:\Windows\SysWOW64\cmd.exe
          "cmd.exe" /c TASKLIST /FI "STATUS eq RUNNING" | find /V "Image Name" | find /V "="
          2⤵
          • Suspicious use of WriteProcessMemory
          PID:3288
          • C:\Windows\SysWOW64\tasklist.exe
            TASKLIST /FI "STATUS eq RUNNING"
            3⤵
            • Enumerates processes with tasklist
            • Suspicious use of AdjustPrivilegeToken
            PID:2208
          • C:\Windows\SysWOW64\find.exe
            find /V "Image Name"
            3⤵
              PID:2620
            • C:\Windows\SysWOW64\find.exe
              find /V "="
              3⤵
                PID:2536
          • C:\Windows\System32\rundll32.exe
            C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
            1⤵
              PID:1788

            Network

            MITRE ATT&CK Enterprise v15

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\tmp469E.tmp

              Filesize

              1KB

              MD5

              3c2bd0bfa8854c70e70ab4e657adfb79

              SHA1

              77ae58a6b479308d631df6fef5f3100dedf3c36a

              SHA256

              57a50372f67d4b8d1aed68e9bb30946c36ab2aa6dd56c6d3ed2d8d877c7fe858

              SHA512

              dcaec3c80cff1e73cd523cc14ab117366f3649ed0a0b7548c90c962da6262137f41971bd3d858f47d0114ee9be46db14d6dec83aa426d9b2efc8b6ca9c9d1a4d

            • memory/4260-0-0x0000000000540000-0x0000000000554000-memory.dmp

              Filesize

              80KB

            • memory/4260-1-0x0000000074400000-0x0000000074BB0000-memory.dmp

              Filesize

              7.7MB

            • memory/4260-2-0x0000000004F80000-0x0000000004F90000-memory.dmp

              Filesize

              64KB

            • memory/4260-5-0x0000000005950000-0x00000000059B6000-memory.dmp

              Filesize

              408KB

            • memory/4260-7-0x0000000074400000-0x0000000074BB0000-memory.dmp

              Filesize

              7.7MB