Analysis

  • max time kernel
    124s
  • max time network
    147s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    29-05-2020 11:38

General

  • Target

    UnluckyWare.exe

  • Size

    228KB

  • MD5

    d7924023e6cb8826e6db9c1bb917ee4e

  • SHA1

    d3727664988db585b9d632d2888963019b5e6e11

  • SHA256

    a9c4d78cd5e550155bf8cc080f30d632a15155a6dd55b1d5991b7d40809ce336

  • SHA512

    249102437da4a1a361b082b1683f4a69f7ee48ec7e423d2e0551440b61cbbd9f86ce2bd9b93507f7ffa4d268fb0f8d898870162eeb5eea458db67b50b3091519

Malware Config

Signatures

  • Modifies control panel 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 13 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Drops file in Windows directory 1 IoCs
  • Drops desktop.ini file(s) 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UnluckyWare.exe
    "C:\Users\Admin\AppData\Local\Temp\UnluckyWare.exe"
    1⤵
    • Modifies control panel
    • Sets desktop wallpaper using registry
    • Suspicious use of AdjustPrivilegeToken
    • Adds Run entry to start application
    • Drops file in Windows directory
    • Drops desktop.ini file(s)
    PID:3812
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 3812 -s 8524
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Program crash
      • Suspicious behavior: EnumeratesProcesses
      PID:3916

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Impact

Defacement

1
T1491

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/3916-0-0x0000000004DA0000-0x0000000004DA1000-memory.dmp
    Filesize

    4KB

  • memory/3916-1-0x00000000051A0000-0x00000000051A1000-memory.dmp
    Filesize

    4KB

  • memory/3916-2-0x00000000055A0000-0x00000000055A1000-memory.dmp
    Filesize

    4KB