Analysis
-
max time kernel
58s -
max time network
61s -
platform
windows10-2004_x64 -
resource
win10v2004-20250314-en -
resource tags
arch:x64arch:x86image:win10v2004-20250314-enlocale:en-usos:windows10-2004-x64system -
submitted
31/03/2025, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
admin.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
admin.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
admin.exe
Resource
win11-20250313-en
General
-
Target
admin.exe
-
Size
342KB
-
MD5
6f57a433dc928532f94273e509e1e165
-
SHA1
4f9193706a8c0276af4c92b7a86d3c7bb04fd4f0
-
SHA256
a8cb1f70c6f69f6120c2f4e47b5658cca9a27b3fffdc7cbe1056e6ab93383c81
-
SHA512
6867c52c74bbbe5dd98895f7923bd1c7d7056bb76efe5fcc49c347a7f7ef7ad517178ded20bcfbb9f6b60be591508bbe27ad6db0fcc61c0cbafafab639e9dbd3
-
SSDEEP
6144:evHh6j8vEoadosWFRLl0cavPTck2tYI26qIPDpS/Lbg3ZKtPNO:ePJERdoVFYcIT/826qIPDpS/3gktFO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\Control Panel\International\Geo\Nation Windows Updater.exe -
Executes dropped EXE 3 IoCs
pid Process 4436 Windows Updater.exe 2728 Windows Updater.exe 3456 Windows Updater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-83325578-304917428-1200496059-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update Client = "\"C:\\Program Files (x86)\\WindowsUpdateSettings\\Windows Updater.exe\"" Windows Updater.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 5 ip-api.com -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf Windows Updater.exe File created C:\autorun.inf Windows Updater.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File opened for modification C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe admin.exe File opened for modification C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe Windows Updater.exe File opened for modification C:\Program Files (x86)\WindowsUpdateSettings Windows Updater.exe File created C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe admin.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 208 schtasks.exe 4632 schtasks.exe 2248 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2436 admin.exe 2436 admin.exe 2436 admin.exe 2436 admin.exe 2436 admin.exe 4436 Windows Updater.exe 4436 Windows Updater.exe 4436 Windows Updater.exe 4436 Windows Updater.exe 4436 Windows Updater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2436 admin.exe Token: SeDebugPrivilege 4436 Windows Updater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4436 Windows Updater.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2436 wrote to memory of 208 2436 admin.exe 90 PID 2436 wrote to memory of 208 2436 admin.exe 90 PID 2436 wrote to memory of 4436 2436 admin.exe 92 PID 2436 wrote to memory of 4436 2436 admin.exe 92 PID 4436 wrote to memory of 4632 4436 Windows Updater.exe 93 PID 4436 wrote to memory of 4632 4436 Windows Updater.exe 93 PID 4436 wrote to memory of 2248 4436 Windows Updater.exe 95 PID 4436 wrote to memory of 2248 4436 Windows Updater.exe 95 PID 4940 wrote to memory of 2728 4940 cmd.exe 99 PID 4940 wrote to memory of 2728 4940 cmd.exe 99 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\admin.exe"C:\Users\Admin\AppData\Local\Temp\admin.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2436 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\admin.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:208
-
-
C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4436 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update Client" /sc ONLOGON /tr "C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:4632
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe" /sc MINUTE /MO 13⤵
- Scheduled Task/Job: Scheduled Task
PID:2248
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:4940 -
C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"2⤵
- Executes dropped EXE
PID:2728
-
-
C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"1⤵
- Executes dropped EXE
PID:3456
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD56f57a433dc928532f94273e509e1e165
SHA14f9193706a8c0276af4c92b7a86d3c7bb04fd4f0
SHA256a8cb1f70c6f69f6120c2f4e47b5658cca9a27b3fffdc7cbe1056e6ab93383c81
SHA5126867c52c74bbbe5dd98895f7923bd1c7d7056bb76efe5fcc49c347a7f7ef7ad517178ded20bcfbb9f6b60be591508bbe27ad6db0fcc61c0cbafafab639e9dbd3
-
Filesize
1KB
MD52362dcc9d262d0969898b143fb7fc91a
SHA12240860a675c86425f5702b501eac121bfb744eb
SHA2564f7cff601d97caf1e0040bc2d63ccadd27294b2e551ff4167e0b080c69a915b0
SHA51259cb7e53dc9cc02f25216cc87115403ed67fb5d24947ef2e803cd54e9f118d5d65a71817b05642c238ca48eb7bfd228d008d92e42023f2c15755c64c88f5b0d6