Analysis

  • max time kernel
    121s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20240729-en
  • resource tags

    arch:x64arch:x86image:win7-20240729-enlocale:en-usos:windows7-x64system
  • submitted
    22/03/2025, 06:13

General

  • Target

    7621266dff8a6ed77a89bf540aa04817.exe

  • Size

    690KB

  • MD5

    7621266dff8a6ed77a89bf540aa04817

  • SHA1

    667a52b0c561ec9a378706be7d5f556b44516c3c

  • SHA256

    ec8db8b10723987c0e27aed520f12d33fff005271b82660969eabf1bfbbd4441

  • SHA512

    9fe8a982bebb3f9316fdfd24f6d990625f521674e43f0dd5e14d3af18a77320d747565ed803626ef94b055c9a9442d9a36da0eda5daa7fd991f9bf38fad89f90

  • SSDEEP

    12288:n2QRXDD1yed0fsU4GSWgOvPESGj4s32xEdRCSkeA0plGImZV5SAw2izK:n2Q9NXw2/wPOjdGxY4DFwde

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Executes dropped EXE 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Delays execution with timeout.exe 1 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: AddClipboardFormatListener 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 12 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7621266dff8a6ed77a89bf540aa04817.exe
    "C:\Users\Admin\AppData\Local\Temp\7621266dff8a6ed77a89bf540aa04817.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2368
    • C:\Windows\system32\schtasks.exe
      "schtasks.exe" /create /tn Windows Update Service /tr "C:\ProgramData\Windows Update Service\Windows Update Service.exe" /st 06:27 /du 23:59 /sc daily /ri 1 /f
      2⤵
      • Scheduled Task/Job: Scheduled Task
      PID:2176
    • C:\ProgramData\Windows Update Service\Windows Update Service.exe
      "C:\ProgramData\Windows Update Service\Windows Update Service.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious behavior: AddClipboardFormatListener
      • Suspicious use of AdjustPrivilegeToken
      PID:2736
    • C:\Windows\system32\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpF3D1.tmp.bat""
      2⤵
      • Deletes itself
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Windows\system32\timeout.exe
        timeout 7
        3⤵
        • Delays execution with timeout.exe
        PID:2768

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\ProgramData\Windows Update Service\Windows Update Service.exe

    Filesize

    690KB

    MD5

    7621266dff8a6ed77a89bf540aa04817

    SHA1

    667a52b0c561ec9a378706be7d5f556b44516c3c

    SHA256

    ec8db8b10723987c0e27aed520f12d33fff005271b82660969eabf1bfbbd4441

    SHA512

    9fe8a982bebb3f9316fdfd24f6d990625f521674e43f0dd5e14d3af18a77320d747565ed803626ef94b055c9a9442d9a36da0eda5daa7fd991f9bf38fad89f90

  • C:\Users\Admin\AppData\Local\Temp\tmpF3D1.tmp.bat

    Filesize

    184B

    MD5

    c0c86604f9e3ded026f7d77d64d4584b

    SHA1

    8421ba1015f097631378fbb69d3385e93361aba4

    SHA256

    e1a95f522d0d3a16a2a1c174559da04407683a22e6d719eae2b8872aa5a0c206

    SHA512

    4ab91a35dbc82d5acf46b758f05a55719f585b686f872cfafa1cdf2de4ce3134052114a944a8bfc33c15caacda2f9c03a1747d939b99fc1ab46c9bec17135d05

  • memory/2368-0-0x000007FEF50B3000-0x000007FEF50B4000-memory.dmp

    Filesize

    4KB

  • memory/2368-1-0x0000000000100000-0x00000000001B2000-memory.dmp

    Filesize

    712KB

  • memory/2368-2-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2368-15-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2736-16-0x0000000000130000-0x00000000001E2000-memory.dmp

    Filesize

    712KB

  • memory/2736-17-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2736-18-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2736-20-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

    Filesize

    9.9MB

  • memory/2736-21-0x000007FEF50B0000-0x000007FEF5A9C000-memory.dmp

    Filesize

    9.9MB