Analysis
-
max time kernel
150s -
max time network
148s -
resource
win10v191014
Task
task1
Sample
iis_agent32.exe
Resource
win7v191014
0 signatures
General
-
Target
iis_agent32.exe
-
Sample
191030-cdxr5hrvmn
-
SHA256
9730e03ca9d052875895b4ad7ba7914f69009fd5fb58d324ee35d3e45f90d768
Score
N/A
Malware Config
Signatures
-
Drops file in system dir 64 IoCs
description ioc pid Process File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Esl\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\1494870C-9912-C184-4CC9-B401-A53F4D8DE290.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Zenis-Hj.HjSFEdMd1MEA 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Click on 'Change' to select default PDF handler.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Click on 'Change' to select default PDF handler.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Zenis-Rs.Rs3dKBRdmt22 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\PDFSigQFormalRep.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Zenis-Kq.KqQAkh70kHeE 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RTC.der 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\RTC.der => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Zenis-OP.OPKVP64qr8Cj 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Welcome.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Zenis-Fs.FsYD3P888Yv0 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\ENU\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroApp\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\COPYING.LGPLv2.1.txt 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\COPYING.LGPLv2.1.txt => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\Zenis-0p.0poNAmQ2DD3T 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\LICENSE.txt 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\LICENSE.txt => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\Zenis-sI.sI25o5UJUdml 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\locales\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroCEF\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AcroLayoutRecognizer\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\AIR\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\WCChromeExtn\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Browser\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\AdobeID.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\AdobeID.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\Zenis-lG.lGPcFbAgS1Nx 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\DefaultID.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\Zenis-op.opJwtz8WZswR 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\ENU\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\IDTemplates\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Javascripts\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\license.html 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\license.html => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\Zenis-D5.D5OglNFOfdHP 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\ENU\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Legal\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\en_US\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\Locale\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\PMP\Zenis-Instructions.html 4852 iis_agent32.exe File created C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\AcroForm\Zenis-Instructions.html 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Words.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Words.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\Zenis-87.87Vj45HW4vYB 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Dynamic.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Zenis-Bg.BgP3jUENBm6f 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\SignHere.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Zenis-29.29dlNoIfSCpx 4852 iis_agent32.exe File opened for modification C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf 4852 iis_agent32.exe File renamed C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\StandardBusiness.pdf => C:\Program Files (x86)\Adobe\Acrobat Reader DC\Reader\plug_ins\Annotations\Stamps\ENU\Zenis-5i.5iW62CFVZ3NR 4852 iis_agent32.exe -
Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
description ioc pid Process Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemManufacturer 4812 svchost.exe Key value queried \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\SystemInformation\SystemProductName 4812 svchost.exe -
description ioc pid Process Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\cval = "0" 2004 svchost.exe Set value (int) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Security Center\cval = "1" 2004 svchost.exe -
Uses Volume Shadow Copy Service COM API 14 IoCs
description ioc pid Process Key opened \Registry\Machine\Software\Classes\CLSID\{E579AB5F-1CC4-44B4-BED9-DE0991FF0623} 4996 vssadmin.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623} 4996 vssadmin.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\TreatAs 4996 vssadmin.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\ 4996 vssadmin.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\InprocServer32 4996 vssadmin.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\InprocHandler32 4996 vssadmin.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\InprocHandler 4996 vssadmin.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44B4-BED9-DE0991FF0623} 5024 vssvc.exe Key queried \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623} 5024 vssvc.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\TreatAs 5024 vssvc.exe Key value queried \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\ 5024 vssvc.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\InprocServer32 5024 vssvc.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\InprocHandler32 5024 vssvc.exe Key opened \REGISTRY\MACHINE\SOFTWARE\Classes\CLSID\{E579AB5F-1CC4-44b4-BED9-DE0991FF0623}\InprocHandler 5024 vssvc.exe -
Suspicious use of WriteProcessMemory 8 IoCs
description pid Process procid_target PID 4852 wrote to memory of 4956 4852 iis_agent32.exe 73 PID 4852 wrote to memory of 5108 4852 iis_agent32.exe 78 PID 4852 wrote to memory of 4232 4852 iis_agent32.exe 82 PID 4852 wrote to memory of 3104 4852 iis_agent32.exe 85 PID 4852 wrote to memory of 3636 4852 iis_agent32.exe 88 PID 4852 wrote to memory of 4560 4852 iis_agent32.exe 91 PID 4852 wrote to memory of 4500 4852 iis_agent32.exe 94 PID 4596 wrote to memory of 3836 4596 SppExtComObj.exe 98 -
Deletes shadow copies 2 TTPs 2 IoCs
pid Process 4996 vssadmin.exe 1940 WMIC.exe -
Modifies Boot Configuration Data 1 TTPs 2 IoCs
pid Process 4436 bcdedit.exe 4452 bcdedit.exe -
Clears Windows event logs 1 TTPs 3 IoCs
pid Process 4492 wevtutil.exe 4532 wevtutil.exe 4604 wevtutil.exe -
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 4852 iis_agent32.exe -
Suspicious use of AdjustPrivilegeToken 31 IoCs
description pid Process Token: SeDebugPrivilege 4852 iis_agent32.exe Token: SeBackupPrivilege 5024 vssvc.exe Token: SeRestorePrivilege 5024 vssvc.exe Token: SeAuditPrivilege 5024 vssvc.exe Token: SeIncreaseQuotaPrivilege 1940 WMIC.exe Token: SeSecurityPrivilege 1940 WMIC.exe Token: SeTakeOwnershipPrivilege 1940 WMIC.exe Token: SeLoadDriverPrivilege 1940 WMIC.exe Token: SeSystemProfilePrivilege 1940 WMIC.exe Token: SeSystemtimePrivilege 1940 WMIC.exe Token: SeProfSingleProcessPrivilege 1940 WMIC.exe Token: SeIncBasePriorityPrivilege 1940 WMIC.exe Token: SeCreatePagefilePrivilege 1940 WMIC.exe Token: SeBackupPrivilege 1940 WMIC.exe Token: SeRestorePrivilege 1940 WMIC.exe Token: SeShutdownPrivilege 1940 WMIC.exe Token: SeDebugPrivilege 1940 WMIC.exe Token: SeSystemEnvironmentPrivilege 1940 WMIC.exe Token: SeRemoteShutdownPrivilege 1940 WMIC.exe Token: SeUndockPrivilege 1940 WMIC.exe Token: SeManageVolumePrivilege 1940 WMIC.exe Token: 33 1940 WMIC.exe Token: 34 1940 WMIC.exe Token: 35 1940 WMIC.exe Token: 36 1940 WMIC.exe Token: SeSecurityPrivilege 4492 wevtutil.exe Token: SeBackupPrivilege 4492 wevtutil.exe Token: SeSecurityPrivilege 4532 wevtutil.exe Token: SeBackupPrivilege 4532 wevtutil.exe Token: SeSecurityPrivilege 4604 wevtutil.exe Token: SeBackupPrivilege 4604 wevtutil.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\iis_agent32.exe"C:\Users\Admin\AppData\Local\Temp\iis_agent32.exe"1⤵
- Drops file in system dir
- Suspicious use of WriteProcessMemory
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:4852
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C vssadmin.exe delete shadows /all /Quiet1⤵PID:4956
-
C:\Windows\system32\vssadmin.exevssadmin.exe delete shadows /all /Quiet1⤵
- Uses Volume Shadow Copy Service COM API
- Deletes shadow copies
PID:4996
-
C:\Windows\system32\vssvc.exeC:\Windows\system32\vssvc.exe1⤵
- Uses Volume Shadow Copy Service COM API
- Suspicious use of AdjustPrivilegeToken
PID:5024
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k swprv1⤵PID:5064
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C WMIC.exe shadowcopy delete1⤵PID:5108
-
C:\Windows\System32\Wbem\WMIC.exeWMIC.exe shadowcopy delete1⤵
- Deletes shadow copies
- Suspicious use of AdjustPrivilegeToken
PID:1940
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C Bcdedit.exe /set {default} recoveryenabled no1⤵PID:4232
-
C:\Windows\system32\bcdedit.exeBcdedit.exe /set {default} recoveryenabled no1⤵
- Modifies Boot Configuration Data
PID:4436
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C Bcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵PID:3104
-
C:\Windows\system32\bcdedit.exeBcdedit.exe /set {default} bootstatuspolicy ignoreallfailures1⤵
- Modifies Boot Configuration Data
PID:4452
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wevtutil.exe cl Application1⤵PID:3636
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Application1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4492
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wevtutil.exe cl Security1⤵PID:4560
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl Security1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4532
-
C:\Windows\System32\cmd.exe"C:\Windows\System32\cmd.exe" /C wevtutil.exe cl System1⤵PID:4500
-
C:\Windows\system32\wevtutil.exewevtutil.exe cl System1⤵
- Clears Windows event logs
- Suspicious use of AdjustPrivilegeToken
PID:4604
-
C:\Windows\system32\SppExtComObj.exeC:\Windows\system32\SppExtComObj.exe -Embedding1⤵
- Suspicious use of WriteProcessMemory
PID:4596
-
C:\Windows\System32\SLUI.exe"C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent1⤵PID:3836
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s BITS1⤵PID:2272
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV1⤵PID:2976
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k netsvcs -s DoSvc1⤵
- Checks system information in the registry (likely anti-VM)
PID:4812
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc1⤵
- Windows security modification
PID:2004
-
\??\c:\windows\system32\svchost.exec:\windows\system32\svchost.exe -k unistacksvcgroup1⤵PID:2064
Network
MITRE ATT&CK Enterprise v15
MITRE ATT&CK Additional techniques
- T1089
- T1107