Analysis

  • max time kernel
    149s
  • max time network
    153s
  • resource
    win7v191014

General

  • Target

    Supergevaarlijkk.zip

  • Sample

    191029-7v9yqqxm3n

  • SHA256

    6cd246cd910e33eaee00e3d138bc49fcf85562b5f8c394d4b092372d25cc0eac

Score
N/A

Malware Config

Signatures

  • Launches SC.exe 1 IoCs
  • Modifies Windows Firewall 1 TTPs 2 IoCs
  • Modifies Internet Explorer settings 1 TTPs 21 IoCs
  • Suspicious use of WriteProcessMemory 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Creates new service 1 TTPs 1 IoCs
  • Windows firewall usage 2 IoCs
  • flawedammy family
  • Loads dropped DLL 1 IoCs
  • Drops file in system dir 2 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Executes dropped EXE 3 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe9d72dd4b046bafdd144902ab570297629f83d06afb5a9ba7703382a29d588f.exe
    "C:\Users\Admin\AppData\Local\Temp\fe9d72dd4b046bafdd144902ab570297629f83d06afb5a9ba7703382a29d588f.exe"
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    • Loads dropped DLL
    • Drops file in system dir
    • Adds Run entry to start application
    PID:1040
  • C:\Program Files (x86)\SinTech\TextEdit.exe
    "C:\Program Files (x86)\SinTech\TextEdit.exe"
    1⤵
    • Executes dropped EXE
    PID:824
  • C:\Windows\SysWOW64\cmd.exe
    cmd /c sc create Wlanspeed binpath= "C:\ProgramData\Wlanspeed\wlanspeed.exe -service" start= auto displayname= "Wlanspeed" & sc description Wlanspeed "Wlanspeed service" && netsh advfirewall firewall add rule name="Wlanspeed" dir=in action=allow profile=any description="Wlanspeed service" program="C:\programdata\Wlanspeed\wlanspeed.exe" && netsh advfirewall firewall add rule name="Wlanspeed" dir=out action=allow profile=any description="Wlanspeed service" program="C:\programdata\Wlanspeed\wlanspeed.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1348
  • C:\Windows\system32\conhost.exe
    \??\C:\Windows\system32\conhost.exe "322372338-141076211-1503080421-146637913-1448740906-34692126-16420535131527021419"
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:836
  • C:\Windows\SysWOW64\sc.exe
    sc create Wlanspeed binpath= "C:\ProgramData\Wlanspeed\wlanspeed.exe -service" start= auto displayname= "Wlanspeed"
    1⤵
    • Creates new service
    PID:768
  • C:\Windows\SysWOW64\sc.exe
    sc description Wlanspeed "Wlanspeed service"
    1⤵
    • Launches SC.exe
    PID:1404
  • C:\Windows\SysWOW64\netsh.exe
    netsh advfirewall firewall add rule name="Wlanspeed" dir=in action=allow profile=any description="Wlanspeed service" program="C:\programdata\Wlanspeed\wlanspeed.exe"
    1⤵
    • Modifies Windows Firewall
    • Windows firewall usage
    PID:1480
  • C:\Windows\SysWOW64\netsh.exe
    netsh advfirewall firewall add rule name="Wlanspeed" dir=out action=allow profile=any description="Wlanspeed service" program="C:\programdata\Wlanspeed\wlanspeed.exe"
    1⤵
    • Modifies Windows Firewall
    • Windows firewall usage
    PID:2004
  • C:\ProgramData\Wlanspeed\wlanspeed.exe
    "C:\ProgramData\Wlanspeed\wlanspeed.exe" -getid -nogui
    1⤵
    • Suspicious use of SetWindowsHookEx
    • Executes dropped EXE
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    PID:1424
  • C:\Program Files\Internet Explorer\iexplore.exe
    "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
    1⤵
    • Modifies Internet Explorer settings
    • Suspicious use of WriteProcessMemory
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SetWindowsHookEx
    PID:1444
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:275457 /prefetch:2
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2004
  • C:\ProgramData\Wlanspeed\outst.exe
    "C:\ProgramData\Wlanspeed\outst.exe" -outid
    1⤵
    • Executes dropped EXE
    PID:2156
  • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
    "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1444 CREDAT:930819 /prefetch:2
    1⤵
    • Suspicious use of SetWindowsHookEx
    PID:2188

Network

MITRE ATT&CK Enterprise v15

MITRE ATT&CK Additional techniques

  • T1031
  • T1050
  • T1060

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/1424-10-0x0000000003820000-0x0000000003831000-memory.dmp

    Filesize

    68KB

  • memory/1424-11-0x0000000003A20000-0x0000000003A31000-memory.dmp

    Filesize

    68KB