Analysis

  • max time kernel
    117s
  • max time network
    110s
  • resource
    win10v191014

General

  • Target

    ec042ea8b6b6a94678df7612bffa69082e772b6c9d8a57b0bc89bc1258046b80

  • Sample

    191025-fs2a5gpl12

  • SHA256

    ec042ea8b6b6a94678df7612bffa69082e772b6c9d8a57b0bc89bc1258046b80

Score
N/A

Malware Config

Signatures

  • Suspicious use of AdjustPrivilegeToken 12 IoCs
  • Drops file in system dir 5 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs
  • Suspicious behavior: EnumeratesProcesses 11 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 22 IoCs
  • Modifies service 2 TTPs 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Program crash 10 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ec042ea8b6b6a94678df7612bffa69082e772b6c9d8a57b0bc89bc1258046b80.exe
    "C:\Users\Admin\AppData\Local\Temp\ec042ea8b6b6a94678df7612bffa69082e772b6c9d8a57b0bc89bc1258046b80.exe"
    1⤵
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:5040
  • C:\Windows\System32\svchost.exe
    C:\Windows\System32\svchost.exe -k WerSvcGroup
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of NtCreateUserProcessOtherParentProcess
    PID:3028
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 340
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious behavior: EnumeratesProcesses
    • Checks system information in the registry (likely anti-VM)
    • Program crash
    PID:4308
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s WdiSystemHost
    1⤵
      PID:1968
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
      1⤵
        PID:4468
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 736
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Checks system information in the registry (likely anti-VM)
        • Program crash
        PID:3200
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 716
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Checks system information in the registry (likely anti-VM)
        • Program crash
        PID:4684
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 740
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Checks system information in the registry (likely anti-VM)
        • Program crash
        PID:4668
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 956
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Checks system information in the registry (likely anti-VM)
        • Program crash
        PID:4788
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 996
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious behavior: EnumeratesProcesses
        • Checks system information in the registry (likely anti-VM)
        • Program crash
        PID:3944
      • C:\Windows\system32\SppExtComObj.exe
        C:\Windows\system32\SppExtComObj.exe -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:4456
      • C:\Windows\System32\SLUI.exe
        "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
        1⤵
          PID:4404
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1140
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          • Checks system information in the registry (likely anti-VM)
          • Program crash
          PID:4296
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1100
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          • Checks system information in the registry (likely anti-VM)
          • Program crash
          PID:2948
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1244
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          • Checks system information in the registry (likely anti-VM)
          • Program crash
          PID:4264
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 5040 -s 1284
          1⤵
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious behavior: EnumeratesProcesses
          • Checks system information in the registry (likely anti-VM)
          • Program crash
          PID:524
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s BITS
          1⤵
          • Drops file in system dir
          • Modifies service
          PID:4944
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
          1⤵
            PID:4632
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
            1⤵
            • Checks system information in the registry (likely anti-VM)
            PID:3664
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k unistacksvcgroup
            1⤵
              PID:3772
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
              1⤵
              • Windows security modification
              PID:4448

            Network

            MITRE ATT&CK Enterprise v15

            MITRE ATT&CK Additional techniques

            • T1031
            • T1089

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER4BE.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WER4DE.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC6C.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERAC8C.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERB5A6.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERB643.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERB8F3.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERB952.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC41.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC5.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBC90.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBDF9.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERBEF4.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC14.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC260.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC280.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC56F.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC58F.tmp.txt
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC820.tmp.csv
            • C:\ProgramData\Microsoft\Windows\WER\Temp\WERC87F.tmp.txt
            • memory/524-62-0x00000000052C0000-0x00000000052C1000-memory.dmp
              Filesize

              4KB

            • memory/524-63-0x00000000053B0000-0x00000000053B1000-memory.dmp
              Filesize

              4KB

            • memory/524-61-0x0000000004820000-0x0000000004821000-memory.dmp
              Filesize

              4KB

            • memory/2948-48-0x0000000004130000-0x0000000004131000-memory.dmp
              Filesize

              4KB

            • memory/2948-51-0x0000000004A90000-0x0000000004A91000-memory.dmp
              Filesize

              4KB

            • memory/2948-52-0x0000000004B90000-0x0000000004B91000-memory.dmp
              Filesize

              4KB

            • memory/3200-12-0x00000000048C0000-0x00000000048C1000-memory.dmp
              Filesize

              4KB

            • memory/3200-9-0x0000000003F00000-0x0000000003F01000-memory.dmp
              Filesize

              4KB

            • memory/3200-13-0x00000000049B0000-0x00000000049B1000-memory.dmp
              Filesize

              4KB

            • memory/3944-37-0x0000000004250000-0x0000000004251000-memory.dmp
              Filesize

              4KB

            • memory/3944-38-0x0000000004A50000-0x0000000004A51000-memory.dmp
              Filesize

              4KB

            • memory/3944-39-0x0000000004B40000-0x0000000004B41000-memory.dmp
              Filesize

              4KB

            • memory/4264-55-0x0000000004900000-0x0000000004901000-memory.dmp
              Filesize

              4KB

            • memory/4264-57-0x00000000053D0000-0x00000000053D1000-memory.dmp
              Filesize

              4KB

            • memory/4264-56-0x00000000052E0000-0x00000000052E1000-memory.dmp
              Filesize

              4KB

            • memory/4296-45-0x0000000004E00000-0x0000000004E01000-memory.dmp
              Filesize

              4KB

            • memory/4296-44-0x0000000004D10000-0x0000000004D11000-memory.dmp
              Filesize

              4KB

            • memory/4296-43-0x00000000045C0000-0x00000000045C1000-memory.dmp
              Filesize

              4KB

            • memory/4308-2-0x00000000046E0000-0x00000000046E1000-memory.dmp
              Filesize

              4KB

            • memory/4308-3-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
              Filesize

              4KB

            • memory/4308-4-0x0000000004EF0000-0x0000000004EF1000-memory.dmp
              Filesize

              4KB

            • memory/4308-6-0x0000000004FE0000-0x0000000004FE1000-memory.dmp
              Filesize

              4KB

            • memory/4668-28-0x00000000053E0000-0x00000000053E1000-memory.dmp
              Filesize

              4KB

            • memory/4668-25-0x0000000005250000-0x0000000005251000-memory.dmp
              Filesize

              4KB

            • memory/4668-24-0x0000000004D90000-0x0000000004D91000-memory.dmp
              Filesize

              4KB

            • memory/4668-21-0x0000000004990000-0x0000000004991000-memory.dmp
              Filesize

              4KB

            • memory/4684-16-0x0000000004BA0000-0x0000000004BA1000-memory.dmp
              Filesize

              4KB

            • memory/4684-18-0x00000000055A0000-0x00000000055A1000-memory.dmp
              Filesize

              4KB

            • memory/4684-17-0x00000000054B0000-0x00000000054B1000-memory.dmp
              Filesize

              4KB

            • memory/4788-33-0x0000000005680000-0x0000000005681000-memory.dmp
              Filesize

              4KB

            • memory/4788-32-0x0000000005590000-0x0000000005591000-memory.dmp
              Filesize

              4KB

            • memory/4788-31-0x0000000004E90000-0x0000000004E91000-memory.dmp
              Filesize

              4KB

            • memory/5040-0-0x0000000000525000-0x0000000000568000-memory.dmp
              Filesize

              268KB

            • memory/5040-1-0x00000000009A0000-0x00000000009A1000-memory.dmp
              Filesize

              4KB