Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
23-05-2024 01:58
Static task
static1
Behavioral task
behavioral1
Sample
60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe
Resource
win7-20240508-en
General
-
Target
60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe
-
Size
666KB
-
MD5
8b67eaaa3b2743e270b215364a52f304
-
SHA1
71ce337b39795fae99bd7ffa0d86a9018646b1cc
-
SHA256
60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d
-
SHA512
8c18a08130420e9273f83636fa9d742fd63ca99fc7210e4ed95c0fc4a13c046b6290c3af5da31e2680324793a1bce0f291f080a5b8a164db3a27058aa3ffccfe
-
SSDEEP
12288:F1BYvTv5zLTIkO9X82Y3f6D+V3CTlTH8RpCQxaPrZ/43hr1OpH5D0:FovT1/IR9+PuQc+txKR4OpH5
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
Processes:
powershell.exepowershell.exepid process 2604 powershell.exe 2792 powershell.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Creates scheduled task(s) 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
-
Suspicious behavior: EnumeratesProcesses 18 IoCs
Processes:
60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exepowershell.exepowershell.exepid process 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 2604 powershell.exe 2792 powershell.exe -
Suspicious use of AdjustPrivilegeToken 3 IoCs
Processes:
60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exepowershell.exepowershell.exedescription pid process Token: SeDebugPrivilege 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe Token: SeDebugPrivilege 2604 powershell.exe Token: SeDebugPrivilege 2792 powershell.exe -
Suspicious use of WriteProcessMemory 32 IoCs
Processes:
60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exedescription pid process target process PID 1740 wrote to memory of 2604 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2604 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2604 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2604 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2792 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2792 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2792 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2792 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe powershell.exe PID 1740 wrote to memory of 2724 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe schtasks.exe PID 1740 wrote to memory of 2724 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe schtasks.exe PID 1740 wrote to memory of 2724 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe schtasks.exe PID 1740 wrote to memory of 2724 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe schtasks.exe PID 1740 wrote to memory of 2528 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2528 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2528 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2528 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2016 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2016 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2016 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2016 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2896 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2896 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2896 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2896 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2960 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2960 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2960 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2960 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2892 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2892 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2892 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe PID 1740 wrote to memory of 2892 1740 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe 60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2604 -
C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\klkxvVGODrsBf.exe"2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:2792 -
C:\Windows\SysWOW64\schtasks.exe"C:\Windows\System32\schtasks.exe" /Create /TN "Updates\klkxvVGODrsBf" /XML "C:\Users\Admin\AppData\Local\Temp\tmp61A0.tmp"2⤵
- Creates scheduled task(s)
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"2⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"2⤵PID:2016
-
C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"2⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"2⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"C:\Users\Admin\AppData\Local\Temp\60ea13ca5f6f7c00c959c098387a8d6a9425f2498ec02ad4d66a856f01acc34d.exe"2⤵PID:2892
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\tmp61A0.tmpFilesize
1KB
MD57431541b24a7282c7f592816fac1901b
SHA169cc0d70a7d84f2fe005419a47f229f2f59d54d8
SHA256808394dd1cf149c9c229169149381cd7dbdb3ed8a6eab8e4e9417b3ac601a4e5
SHA512357fd8ad98d9ab907f29e64cd7e9d2077a86f6d680acb9aeb36bb20a28bec7f97b1c6daef132d530697818b3bb2b2effd6db769b000a50a5d72fa1bb36fbdaa4
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\IV57W4MI1AUISDHV34P4.tempFilesize
7KB
MD5607c901b4634b88872995f53ecaa52f4
SHA1c86b22c5fcf925a61996e2c3f21f98aaeb75b23f
SHA2562bccfdb0982eefec8960bc30a6fbd735214914c7d9f24ca6348f00b60d8a99b5
SHA51240fac59ba72541d4ab51ad2ecbd66502c8fab62946b0ad6d379fcb95601f8cf66596fc4f4a602c1760af9bcdd2c2c8e7df15ecdcefb8468cd54f4794a8521315
-
memory/1740-0-0x000000007495E000-0x000000007495F000-memory.dmpFilesize
4KB
-
memory/1740-1-0x00000000003E0000-0x000000000048C000-memory.dmpFilesize
688KB
-
memory/1740-2-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB
-
memory/1740-3-0x0000000004F00000-0x0000000004FA0000-memory.dmpFilesize
640KB
-
memory/1740-4-0x00000000006C0000-0x00000000006DA000-memory.dmpFilesize
104KB
-
memory/1740-5-0x00000000003D0000-0x00000000003E0000-memory.dmpFilesize
64KB
-
memory/1740-6-0x0000000005330000-0x00000000053B2000-memory.dmpFilesize
520KB
-
memory/1740-19-0x0000000074950000-0x000000007503E000-memory.dmpFilesize
6.9MB