Analysis
-
max time kernel
58s -
max time network
60s -
platform
windows10-ltsc_2021_x64 -
resource
win10ltsc2021-20250314-en -
resource tags
arch:x64arch:x86image:win10ltsc2021-20250314-enlocale:en-usos:windows10-ltsc_2021-x64system -
submitted
31/03/2025, 15:33
Static task
static1
Behavioral task
behavioral1
Sample
admin.exe
Resource
win10v2004-20250314-en
Behavioral task
behavioral2
Sample
admin.exe
Resource
win10ltsc2021-20250314-en
Behavioral task
behavioral3
Sample
admin.exe
Resource
win11-20250313-en
General
-
Target
admin.exe
-
Size
342KB
-
MD5
6f57a433dc928532f94273e509e1e165
-
SHA1
4f9193706a8c0276af4c92b7a86d3c7bb04fd4f0
-
SHA256
a8cb1f70c6f69f6120c2f4e47b5658cca9a27b3fffdc7cbe1056e6ab93383c81
-
SHA512
6867c52c74bbbe5dd98895f7923bd1c7d7056bb76efe5fcc49c347a7f7ef7ad517178ded20bcfbb9f6b60be591508bbe27ad6db0fcc61c0cbafafab639e9dbd3
-
SSDEEP
6144:evHh6j8vEoadosWFRLl0cavPTck2tYI26qIPDpS/Lbg3ZKtPNO:ePJERdoVFYcIT/826qIPDpS/3gktFO
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-2543098825-609255811-1615676193-1000\Control Panel\International\Geo\Nation Windows Updater.exe -
Executes dropped EXE 2 IoCs
pid Process 4628 Windows Updater.exe 784 Windows Updater.exe -
Adds Run key to start application 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2543098825-609255811-1615676193-1000\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Windows Update Client = "\"C:\\Program Files (x86)\\WindowsUpdateSettings\\Windows Updater.exe\"" Windows Updater.exe -
Looks up external IP address via web service 1 IoCs
Uses a legitimate IP lookup service to find the infected system's external IP.
flow ioc 6 ip-api.com -
Drops autorun.inf file 1 TTPs 2 IoCs
Malware can abuse Windows Autorun to spread further via attached volumes.
description ioc Process File created F:\autorun.inf Windows Updater.exe File created C:\autorun.inf Windows Updater.exe -
Drops file in Program Files directory 4 IoCs
description ioc Process File created C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe admin.exe File opened for modification C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe admin.exe File opened for modification C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe Windows Updater.exe File opened for modification C:\Program Files (x86)\WindowsUpdateSettings Windows Updater.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Scheduled Task/Job: Scheduled Task 1 TTPs 3 IoCs
Schtasks is often used by malware for persistence or to perform post-infection execution.
pid Process 4552 schtasks.exe 3100 schtasks.exe 2544 schtasks.exe -
Suspicious behavior: EnumeratesProcesses 10 IoCs
pid Process 2416 admin.exe 2416 admin.exe 2416 admin.exe 2416 admin.exe 2416 admin.exe 4628 Windows Updater.exe 4628 Windows Updater.exe 4628 Windows Updater.exe 4628 Windows Updater.exe 4628 Windows Updater.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
description pid Process Token: SeDebugPrivilege 2416 admin.exe Token: SeDebugPrivilege 4628 Windows Updater.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4628 Windows Updater.exe -
Suspicious use of WriteProcessMemory 10 IoCs
description pid Process procid_target PID 2416 wrote to memory of 4552 2416 admin.exe 82 PID 2416 wrote to memory of 4552 2416 admin.exe 82 PID 2416 wrote to memory of 4628 2416 admin.exe 84 PID 2416 wrote to memory of 4628 2416 admin.exe 84 PID 4628 wrote to memory of 3100 4628 Windows Updater.exe 87 PID 4628 wrote to memory of 3100 4628 Windows Updater.exe 87 PID 4628 wrote to memory of 2544 4628 Windows Updater.exe 89 PID 4628 wrote to memory of 2544 4628 Windows Updater.exe 89 PID 2512 wrote to memory of 784 2512 cmd.exe 93 PID 2512 wrote to memory of 784 2512 cmd.exe 93 -
Uses Task Scheduler COM API 1 TTPs
The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.
Processes
-
C:\Users\Admin\AppData\Local\Temp\admin.exe"C:\Users\Admin\AppData\Local\Temp\admin.exe"1⤵
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:2416 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update Client" /sc ONLOGON /tr "C:\Users\Admin\AppData\Local\Temp\admin.exe" /rl HIGHEST /f2⤵
- Scheduled Task/Job: Scheduled Task
PID:4552
-
-
C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"2⤵
- Checks computer location settings
- Executes dropped EXE
- Adds Run key to start application
- Drops autorun.inf file
- Drops file in Program Files directory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4628 -
C:\Windows\SYSTEM32\schtasks.exe"schtasks" /create /tn "Windows Update Client" /sc ONLOGON /tr "C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe" /rl HIGHEST /f3⤵
- Scheduled Task/Job: Scheduled Task
PID:3100
-
-
C:\Windows\System32\schtasks.exe"C:\Windows\System32\schtasks.exe" /create /tn "WINDOWSSYSTEMHOST" /tr "C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe" /sc MINUTE /MO 13⤵
- Scheduled Task/Job: Scheduled Task
PID:2544
-
-
-
C:\Windows\system32\cmd.exeC:\Windows\system32\cmd.exe /c "C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"C:\Program Files (x86)\WindowsUpdateSettings\Windows Updater.exe"2⤵
- Executes dropped EXE
PID:784
-
Network
MITRE ATT&CK Enterprise v15
Persistence
Boot or Logon Autostart Execution
1Registry Run Keys / Startup Folder
1Scheduled Task/Job
1Scheduled Task
1Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
342KB
MD56f57a433dc928532f94273e509e1e165
SHA14f9193706a8c0276af4c92b7a86d3c7bb04fd4f0
SHA256a8cb1f70c6f69f6120c2f4e47b5658cca9a27b3fffdc7cbe1056e6ab93383c81
SHA5126867c52c74bbbe5dd98895f7923bd1c7d7056bb76efe5fcc49c347a7f7ef7ad517178ded20bcfbb9f6b60be591508bbe27ad6db0fcc61c0cbafafab639e9dbd3