Analysis

  • max time kernel
    148s
  • max time network
    152s
  • resource
    win10v191014

General

  • Target

    084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e

  • Sample

    191025-f6pl6zcd7e

  • SHA256

    084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e

Score
N/A

Malware Config

Signatures

  • Suspicious use of SetThreadContext 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 6 IoCs
  • Checks SCSI registry key(s) (likely anti-VM) 3 TTPs 12 IoCs
  • Enumerates system info in registry 2 TTPs 8 IoCs
  • Checks processor information in registry (likely anti-VM) 2 TTPs 4 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Drops file in system dir 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Program crash 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Checks processor name in registry (likely anti-VM) 2 TTPs 2 IoCs
  • Modifies service 2 TTPs 1 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Drops Office document 23 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe
    "C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:4984
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1948
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:1572
    • C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe
      "C:\Users\Admin\AppData\Local\Temp\084e772f4891b7047ce98b2fe70d9472ed7afbc36477ada6d5a7b589042f3d8e.exe"
      1⤵
      • Drops Office document
      PID:992
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k WerSvcGroup
      1⤵
      • Suspicious use of NtCreateUserProcessOtherParentProcess
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2876
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 324
      1⤵
      • Suspicious behavior: EnumeratesProcesses
      • Checks system information in the registry (likely anti-VM)
      • Enumerates system info in registry
      • Checks processor information in registry (likely anti-VM)
      • Program crash
      • Suspicious use of AdjustPrivilegeToken
      • Checks processor name in registry (likely anti-VM)
      PID:4008
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
      1⤵
      • Checks SCSI registry key(s) (likely anti-VM)
      • Modifies system certificate store
      PID:4556
    • C:\Windows\System32\svchost.exe
      C:\Windows\System32\svchost.exe -k wsappx -s ClipSVC
      1⤵
      • Checks SCSI registry key(s) (likely anti-VM)
      • Suspicious use of AdjustPrivilegeToken
      PID:3660
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s wisvc
      1⤵
        PID:4652
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4984 -s 316
        1⤵
        • Suspicious behavior: EnumeratesProcesses
        • Checks system information in the registry (likely anti-VM)
        • Enumerates system info in registry
        • Checks processor information in registry (likely anti-VM)
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        • Checks processor name in registry (likely anti-VM)
        PID:4712
      • \??\c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s WdiSystemHost
        1⤵
          PID:3692
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
          1⤵
            PID:3868
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s BITS
            1⤵
            • Drops file in system dir
            • Modifies service
            PID:3960
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
            1⤵
              PID:2968
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
              1⤵
              • Checks system information in the registry (likely anti-VM)
              PID:3060
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k unistacksvcgroup
              1⤵
                PID:3280
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
                1⤵
                • Windows security modification
                PID:3628

              Network

              MITRE ATT&CK Enterprise v15

              MITRE ATT&CK Additional techniques

              • T1031
              • T1130
              • T1089

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDBF8.tmp.csv

              • C:\ProgramData\Microsoft\Windows\WER\Temp\WERDC18.tmp.txt

              • C:\ProgramData\Microsoft\Windows\WER\Temp\WERF975.tmp.csv

              • C:\ProgramData\Microsoft\Windows\WER\Temp\WERF9A5.tmp.txt

              • memory/992-1-0x0000000000400000-0x0000000000426000-memory.dmp

                Filesize

                152KB

              • memory/992-0-0x0000000000400000-0x0000000000426000-memory.dmp

                Filesize

                152KB

              • memory/4008-3-0x00000000051D0000-0x00000000051D1000-memory.dmp

                Filesize

                4KB

              • memory/4008-4-0x0000000005330000-0x0000000005331000-memory.dmp

                Filesize

                4KB

              • memory/4008-2-0x0000000004990000-0x0000000004991000-memory.dmp

                Filesize

                4KB

              • memory/4712-7-0x00000000049E0000-0x00000000049E1000-memory.dmp

                Filesize

                4KB

              • memory/4712-8-0x00000000053C0000-0x00000000053C1000-memory.dmp

                Filesize

                4KB

              • memory/4712-9-0x00000000054B0000-0x00000000054B1000-memory.dmp

                Filesize

                4KB

              • memory/4712-12-0x00000000054B0000-0x00000000054B1000-memory.dmp

                Filesize

                4KB