Analysis

  • max time kernel
    130s
  • max time network
    150s
  • resource
    win10v191014

General

  • Target

    14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

  • Sample

    191025-kd2qyx1bse

  • SHA256

    14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

Score
N/A

Malware Config

Signatures

  • Drops file in system dir 5 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs
  • Program crash 1 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 4 IoCs
  • Checks processor information in registry (likely anti-VM) 2 TTPs 2 IoCs
  • Checks processor name in registry (likely anti-VM) 2 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Checks SCSI registry key(s) (likely anti-VM) 3 TTPs 12 IoCs
  • Enumerates system info in registry 2 TTPs 4 IoCs
  • Modifies service 2 TTPs 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e.exe
    "C:\Users\Admin\AppData\Local\Temp\14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4936
  • C:\Windows\system32\SppExtComObj.exe
    C:\Windows\system32\SppExtComObj.exe -Embedding
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5088
  • C:\Windows\System32\SLUI.exe
    "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
    1⤵
      PID:5116
    • C:\Users\Admin\AppData\Local\Temp\14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e.exe
      "C:\Users\Admin\AppData\Local\Temp\14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e.exe" --Admin
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2108
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
      1⤵
        PID:1060
      • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
        powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
        1⤵
          PID:3980
        • C:\Windows\System32\svchost.exe
          C:\Windows\System32\svchost.exe -k WerSvcGroup
          1⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of NtCreateUserProcessOtherParentProcess
          PID:4500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3980 -s 668
          1⤵
          • Program crash
          • Checks system information in the registry (likely anti-VM)
          • Checks processor information in registry (likely anti-VM)
          • Checks processor name in registry (likely anti-VM)
          • Suspicious behavior: EnumeratesProcesses
          • Enumerates system info in registry
          • Suspicious use of AdjustPrivilegeToken
          PID:3712
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s WdiSystemHost
          1⤵
            PID:4628
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s wlidsvc
            1⤵
            • Checks SCSI registry key(s) (likely anti-VM)
            • Modifies system certificate store
            PID:4684
          • C:\Windows\System32\svchost.exe
            C:\Windows\System32\svchost.exe -k wsappx -s ClipSVC
            1⤵
            • Checks SCSI registry key(s) (likely anti-VM)
            • Suspicious use of AdjustPrivilegeToken
            PID:4340
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s wisvc
            1⤵
              PID:4220
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s BITS
              1⤵
              • Drops file in system dir
              • Modifies service
              PID:4124
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
              1⤵
                PID:4112
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
                1⤵
                • Checks system information in the registry (likely anti-VM)
                PID:4524
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
                1⤵
                • Windows security modification
                PID:4732
              • \??\c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k unistacksvcgroup
                1⤵
                  PID:4236

                Network

                MITRE ATT&CK Enterprise v15

                MITRE ATT&CK Additional techniques

                • T1031
                • T1089
                • T1130

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/2108-2-0x00000000021D0000-0x00000000021D1000-memory.dmp

                  Filesize

                  4KB

                • memory/3712-4-0x0000000004850000-0x0000000004851000-memory.dmp

                  Filesize

                  4KB

                • memory/3712-5-0x0000000005110000-0x0000000005111000-memory.dmp

                  Filesize

                  4KB

                • memory/3712-6-0x0000000005110000-0x0000000005111000-memory.dmp

                  Filesize

                  4KB

                • memory/3712-8-0x0000000005270000-0x0000000005271000-memory.dmp

                  Filesize

                  4KB

                • memory/4936-0-0x0000000002250000-0x0000000002251000-memory.dmp

                  Filesize

                  4KB

                • memory/4936-1-0x000000000048E000-0x000000000048F000-memory.dmp

                  Filesize

                  4KB