Analysis

  • max time kernel
    132s
  • max time network
    151s
  • resource
    win10v191014

General

  • Target

    428f9a2b4cbc33879806996a030c02f0e60521b9

  • Sample

    191018-xkfwrmh4f2

  • SHA256

    6e25a2f2af3466370503b75f31440d1d48e10b89376f224bd1f4090ba8062710

Score
N/A

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of WriteProcessMemory 3 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses Task Scheduler COM API 1 TTPs 29 IoCs
  • Drops file in system dir 5 IoCs
  • trickbot family
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Modifies service 2 TTPs 1 IoCs
  • Trickbot persistence files 1 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\428f9a2b4cbc33879806996a030c02f0e60521b9.exe
    "C:\Users\Admin\AppData\Local\Temp\428f9a2b4cbc33879806996a030c02f0e60521b9.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious use of SetWindowsHookEx
    PID:4912
  • C:\ProgramData\авоор.exe
    "C:\ProgramData\авоор.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:5024
  • C:\Windows\system32\svchost.exe
    C:\Windows\system32\svchost.exe
    1⤵
    • Uses Task Scheduler COM API
    PID:5056
  • C:\Users\Admin\AppData\Roaming\netRest\авоор.exe
    C:\Users\Admin\AppData\Roaming\netRest\авоор.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    • Executes dropped EXE
    • Suspicious use of SetWindowsHookEx
    PID:4228
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s BITS
    1⤵
    • Drops file in system dir
    • Modifies service
    PID:1312
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
    1⤵
      PID:4360
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      • Uses Task Scheduler COM API
      • Trickbot persistence files
      PID:3872
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
      1⤵
      • Checks system information in the registry (likely anti-VM)
      PID:4680
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
      1⤵
      • Windows security modification
      PID:4188
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k unistacksvcgroup
      1⤵
        PID:3704

      Network

      • 52.109.120.19:443
        nexusrules.officeapps.live.com
        2.3kB
        7.0kB
        12
        6
      • 52.109.120.22:443
        nexus.officeapps.live.com
        4.2kB
        9.8kB
        17
        11
      • 104.81.140.70:443
        fs.microsoft.com
        BITS
        3.4kB
        71.1kB
        46
        16
      • 104.81.140.70:443
        fs.microsoft.com
        BITS
        3.4kB
        71.1kB
        46
        16
      • 104.81.140.70:443
        fs.microsoft.com
        BITS
        3.4kB
        71.1kB
        46
        16
      • 127.0.0.1:47001
        BITS
      • 31.184.253.37:443
        198 B
        3
      • 104.81.140.70:443
        fs.microsoft.com
        BITS
        4.7kB
        87.6kB
        59
        23
      • 31.184.253.37:443
        svchost.exe
        198 B
        3
      • 8.8.8.8:53
        nexus.officeapps.live.com
        85 B
        147 B
        1
        1

        DNS Request

        nexus.officeapps.live.com

        DNS Response

        52.109.120.22

      • 8.8.8.8:53
        nexusrules.officeapps.live.com
        90 B
        155 B
        1
        1

        DNS Request

        nexusrules.officeapps.live.com

        DNS Response

        52.109.120.19

      • 239.255.255.250:1900
        SSDPSRV
      • 10.10.0.255:137
        440 B
        4
      • 8.8.8.8:53
        fs.microsoft.com
        76 B
        283 B
        1
        1

        DNS Request

        fs.microsoft.com

        DNS Response

        104.81.140.70

      • 239.255.255.250:1900
        1.4kB
        8
      • 10.10.0.26:59808
        120 B
        1
      • 10.10.0.13
        148 B
        1

      MITRE ATT&CK Enterprise v15

      MITRE ATT&CK Additional techniques

      • T1089
      • T1031

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/5024-2-0x0000000000770000-0x000000000079E000-memory.dmp

        Filesize

        184KB

      We care about your privacy.

      This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.