Resubmissions

24-05-2020 06:24

200524-arhqf6gx92 10

Analysis

  • max time kernel
    142s
  • max time network
    132s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    24-05-2020 06:24

General

  • Target

    Enced.exe

  • Size

    61KB

  • MD5

    56eaa612cc10404d14aeb013dc66a279

  • SHA1

    9832299df389f4ebf2b442c049b5a3c7317f3263

  • SHA256

    bb71dd1c92f7a40339184d27f53708c7c7e6f73a12bf41f462248a2f24588959

  • SHA512

    5faf5bbbca1578d65ad5067f5345bc5eedaf1ca97fce0502a8a9baa7f64d864f382cffde603e386d7a7f2ed1201f13b915b6fe9ff80909c8acca13fc1d58d7cc

Score
10/10

Malware Config

Signatures

  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies control panel 1 IoCs
  • Program crash 1 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs
  • Checks whether UAC is enabled 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Modifies registry class 113 IoCs
  • Modifies Internet Explorer settings 1 TTPs 2 IoCs
  • Delays execution with timeout.exe 1 IoCs
  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Enced.exe
    "C:\Users\Admin\AppData\Local\Temp\Enced.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4004
    • C:\Windows\System32\cmd.exe
      "C:\Windows\System32\cmd.exe" /C timeout 2 && Del /Q /F C:\Users\Admin\AppData\Local\Temp\Enced.exe
      2⤵
        PID:2252
        • C:\Windows\system32\timeout.exe
          timeout 2
          3⤵
          • Delays execution with timeout.exe
          PID:2944
    • C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe
      "C:\Windows\SystemApps\Microsoft.MicrosoftEdge_8wekyb3d8bbwe\MicrosoftEdge.exe" -ServerName:MicrosoftEdge.AppXdnhjhccw3zf0j06tkg3jtqr00qdm0khc.mca
      1⤵
      • Drops file in Windows directory
      • Modifies control panel
      • Checks whether UAC is enabled
      • Suspicious use of AdjustPrivilegeToken
      • Modifies registry class
      • Modifies Internet Explorer settings
      • Suspicious use of SetWindowsHookEx
      PID:1064
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1064 -s 3388
        2⤵
        • Checks processor information in registry
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Suspicious behavior: EnumeratesProcesses
        • Enumerates system info in registry
        PID:3928
    • C:\Windows\system32\browser_broker.exe
      C:\Windows\system32\browser_broker.exe -Embedding
      1⤵
      • Modifies Internet Explorer settings
      PID:1224

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    Query Registry

    2
    T1012

    System Information Discovery

    2
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\READ_ME.html
    • memory/3928-1-0x000002B2E1170000-0x000002B2E1171000-memory.dmp
      Filesize

      4KB

    • memory/3928-2-0x000002B2E1170000-0x000002B2E1171000-memory.dmp
      Filesize

      4KB

    • memory/3928-4-0x000002B2E2120000-0x000002B2E2121000-memory.dmp
      Filesize

      4KB

    • memory/3928-7-0x000002B2E2120000-0x000002B2E2121000-memory.dmp
      Filesize

      4KB

    • memory/3928-8-0x000002B2E22A0000-0x000002B2E22A1000-memory.dmp
      Filesize

      4KB