Analysis
-
max time kernel
118s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
05-04-2024 01:25
Static task
static1
Behavioral task
behavioral1
Sample
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe
Resource
win10v2004-20240226-en
General
-
Target
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe
-
Size
961KB
-
MD5
73d358a6b2ad4ced8a885895e0c12dba
-
SHA1
5dfb45244f148645ac66417bddc76cd4bb441e89
-
SHA256
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf
-
SHA512
e59e9b877001c22a3fe0990b8b3a9daba8567d4db456f56e00d8bb170dddd1462d29c839832825ddbef5edcbf082a9fe04b060c7a55b8930b5f9b9689fb5e7a6
-
SSDEEP
24576:24FOzdtX2DtZzBRPOoY34+t5EEtG6XuRvyMnllW:Ted2DtZlRmoe4seEtBXuRvyU
Malware Config
Signatures
-
Detects executables packed with SmartAssembly 2 IoCs
Processes:
resource yara_rule behavioral1/memory/2204-3-0x00000000002C0000-0x00000000002D0000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly behavioral1/memory/2204-4-0x00000000003E0000-0x00000000003EC000-memory.dmp INDICATOR_EXE_Packed_SmartAssembly -
Uses the VBS compiler for execution 1 TTPs
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 14 IoCs
Processes:
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exepowershell.exepowershell.exepid process 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe 2684 powershell.exe 2532 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe Token: SeDebugPrivilege 2684 powershell.exe Token: SeDebugPrivilege 2532 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exedescription pid process target process PID 2204 wrote to memory of 2684 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2684 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2684 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2684 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2532 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2532 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2532 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2532 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe powershell.exe PID 2204 wrote to memory of 2680 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe schtasks.exe PID 2204 wrote to memory of 2680 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe schtasks.exe PID 2204 wrote to memory of 2680 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe schtasks.exe PID 2204 wrote to memory of 2680 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe schtasks.exe PID 2204 wrote to memory of 2716 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2716 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2716 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2716 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 3024 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 3024 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 3024 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 3024 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2868 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2868 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2868 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2868 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2872 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2872 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2872 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2872 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2152 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2152 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2152 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe PID 2204 wrote to memory of 2152 2204 74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe vbc.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe"C:\Users\Admin\AppData\Local\Temp\74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\74a07ee3f0060987ebcb09e588ac1299a9d2a19e2f4139385f7880c229e2c8cf.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\GzaqkFxrVt.exe"2⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
-
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\GzaqkFxrVt" /XML "C:\Users\Admin\AppData\Local\Temp\tmp8AB3.tmp"2⤵
- Creates scheduled task(s)
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
-
C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\vbc.exe"2⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp8AB3.tmpFilesize
1KB
MD5eea049775967400385c3455c41e1af05
SHA1ae66e3ea85053c3e0d7b69acf5301a37a82bfc92
SHA2566daf82c7a664733241a53448afcd0389e3960aa7da27d3b5a8cbce3336560f38
SHA5123146c91897bb6364120edd197fccb72e4e2e4ee2884684fcf172e6976164f9c09649587b5d53015a4329db4467cd7f5c8b726b81558f2663f2134e4e60a366f8
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\EOUEL2QVXYM59LFJ4OC6.tempFilesize
7KB
MD5b78a72d6a64ec29a47daf7036df3961e
SHA1a304ffb792ef96bd24745ce69ed988973408793c
SHA256d07f827b04791ef39219c830d315df5f96e25df86c69ce68fcf6d84a84476437
SHA51278cb6d77619c90866a2708496f45c4b51be93b6039e19cdec73553bde37c2dfc204e1ae518e2b37e8f81979fe65be8ad836afb443cb5da49c9e0418bfc24a03c
-
memory/2204-22-0x0000000074870000-0x0000000074F5E000-memory.dmpFilesize
6.9MB
-
memory/2204-3-0x00000000002C0000-0x00000000002D0000-memory.dmpFilesize
64KB
-
memory/2204-4-0x00000000003E0000-0x00000000003EC000-memory.dmpFilesize
48KB
-
memory/2204-5-0x0000000005380000-0x0000000005440000-memory.dmpFilesize
768KB
-
memory/2204-2-0x0000000005080000-0x00000000050C0000-memory.dmpFilesize
256KB
-
memory/2204-1-0x0000000074870000-0x0000000074F5E000-memory.dmpFilesize
6.9MB
-
memory/2204-0-0x0000000000FA0000-0x0000000001094000-memory.dmpFilesize
976KB
-
memory/2532-21-0x000000006E340000-0x000000006E8EB000-memory.dmpFilesize
5.7MB
-
memory/2532-20-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/2532-18-0x000000006E340000-0x000000006E8EB000-memory.dmpFilesize
5.7MB
-
memory/2532-24-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/2532-25-0x0000000002650000-0x0000000002690000-memory.dmpFilesize
256KB
-
memory/2532-27-0x000000006E340000-0x000000006E8EB000-memory.dmpFilesize
5.7MB
-
memory/2684-19-0x000000006E340000-0x000000006E8EB000-memory.dmpFilesize
5.7MB
-
memory/2684-23-0x0000000002510000-0x0000000002550000-memory.dmpFilesize
256KB
-
memory/2684-26-0x0000000002510000-0x0000000002550000-memory.dmpFilesize
256KB
-
memory/2684-28-0x000000006E340000-0x000000006E8EB000-memory.dmpFilesize
5.7MB