Overview
overview
8Static
static
1.exe
windows7_x64
11.exe
windows10_x64
8Fallen.exe
windows7_x64
8Fallen.exe
windows10_x64
8Inte.exe
windows7_x64
8Inte.exe
windows10_x64
8LX64
windows7_x64
1LX64
windows10_x64
1Server.exe
windows7_x64
8Server.exe
windows10_x64
8hfs.exe
windows7_x64
6hfs.exe
windows10_x64
6hfs_1.exe
windows7_x64
6hfs_1.exe
windows10_x64
6hg
windows7_x64
1hg
windows10_x64
1java
windows7_x64
1java
windows10_x64
1moren.exe
windows7_x64
6moren.exe
windows10_x64
6Analysis
-
max time kernel
151s -
max time network
153s -
platform
windows10_x64 -
resource
win10v200217 -
submitted
10-03-2020 00:09
Static task
static1
Behavioral task
behavioral1
Sample
1.exe
Resource
win7v200217
Behavioral task
behavioral2
Sample
1.exe
Resource
win10v200217
Behavioral task
behavioral3
Sample
Fallen.exe
Resource
win7v200217
Behavioral task
behavioral4
Sample
Fallen.exe
Resource
win10v200217
Behavioral task
behavioral5
Sample
Inte.exe
Resource
win7v200217
Behavioral task
behavioral6
Sample
Inte.exe
Resource
win10v200217
Behavioral task
behavioral7
Sample
LX64
Resource
win7v200217
Behavioral task
behavioral8
Sample
LX64
Resource
win10v200217
Behavioral task
behavioral9
Sample
Server.exe
Resource
win7v200217
Behavioral task
behavioral10
Sample
Server.exe
Resource
win10v200217
Behavioral task
behavioral11
Sample
hfs.exe
Resource
win7v200217
Behavioral task
behavioral12
Sample
hfs.exe
Resource
win10v200217
Behavioral task
behavioral13
Sample
hfs_1.exe
Resource
win7v200217
Behavioral task
behavioral14
Sample
hfs_1.exe
Resource
win10v200217
Behavioral task
behavioral15
Sample
hg
Resource
win7v200217
Behavioral task
behavioral16
Sample
hg
Resource
win10v200217
Behavioral task
behavioral17
Sample
java
Resource
win7v200217
Behavioral task
behavioral18
Sample
java
Resource
win10v200217
Behavioral task
behavioral19
Sample
moren.exe
Resource
win7v200217
Behavioral task
behavioral20
Sample
moren.exe
Resource
win10v200217
General
-
Target
Inte.exe
-
Size
56KB
-
MD5
1ea2c756a0f0528d2e80ab204aa9de0b
-
SHA1
44177c8b4959a3b84ae65a5ea724a8e409b3dec1
-
SHA256
6d77d544364cdfaebd7252d14091653c903d0a11c34bddad60f5951da257a651
-
SHA512
ecaa88ae3a0b51ba9320870a6b7172a3f02c466571d79f7536ee3b557da14f0b268be39cc3fbeadae79f3de33d816a59737efdc7ce11d322d4891c82421d1de5
Malware Config
Signatures
-
Modifies service 2 TTPs 1 IoCs
Processes:
Inte.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SYSTEM\ControlSet001\Services\Windows Test My Test 1.0\Description = "This is Windows Test My Test Server 1.0" Inte.exe -
Checks processor information in registry 2 TTPs 2 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
vmware-vmx.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 vmware-vmx.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz vmware-vmx.exe -
Executes dropped EXE 1 IoCs
Processes:
vmware-vmx.exepid process 3668 vmware-vmx.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
Processes:
Inte.exedescription pid process Token: SeIncBasePriorityPrivilege 3560 Inte.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
Inte.exedescription pid process target process PID 3560 wrote to memory of 3076 3560 Inte.exe cmd.exe PID 3560 wrote to memory of 3076 3560 Inte.exe cmd.exe PID 3560 wrote to memory of 3076 3560 Inte.exe cmd.exe -
Drops file in System32 directory 2 IoCs
Processes:
Inte.exedescription ioc process File created C:\Windows\SysWOW64\vmware-vmx.exe Inte.exe File opened for modification C:\Windows\SysWOW64\vmware-vmx.exe Inte.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\Inte.exe"C:\Users\Admin\AppData\Local\Temp\Inte.exe"1⤵
- Modifies service
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- Drops file in System32 directory
PID:3560 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c del C:\Users\Admin\AppData\Local\Temp\Inte.exe > nul2⤵PID:3076
-
C:\Windows\SysWOW64\vmware-vmx.exeC:\Windows\SysWOW64\vmware-vmx.exe1⤵
- Checks processor information in registry
- Executes dropped EXE
PID:3668