Analysis

  • max time kernel
    114s
  • max time network
    87s
  • platform
    windows10_x64
  • resource
    win10v200430
  • submitted
    31-05-2020 03:16

General

  • Target

    126.exe

  • Size

    2.0MB

  • MD5

    b919752b83989b556d95d96907cc92c8

  • SHA1

    454921a53827410334a19f536140f0dd9ae140a3

  • SHA256

    4b27e32e9057afc255a41f8277eae7d4eef6715033e917e96ce436fcb42335aa

  • SHA512

    b574eea1e05435667c6c52997502a73064e24da10c47c67ea1d20f5392377bb41c7cf52c7bc7fac5a37a3c5760f1fec258e97397642b1975b840e9945069c497

Score
8/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 38 IoCs
  • Executes dropped EXE 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Program crash 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 31 IoCs
  • Drops startup file 4 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Modifies registry class 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\126.exe
    "C:\Users\Admin\AppData\Local\Temp\126.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    • Modifies registry class
    PID:2112
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\fontcrt\MwNjvr88NQJRSWi19KqHvdvHPGxkRc.vbs"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:3928
      • C:\Windows\SysWOW64\cmd.exe
        C:\Windows\system32\cmd.exe /c ""C:\fontcrt\f8IOiW4b1oJg0IdnBPNY1lP2Kk6HqE.bat" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1492
        • C:\fontcrt\nlHa4dneFyvW7t91tTqX.exe
          nlHa4dneFyvW7t91tTqX.exe -pfc114bf1799a11cca515d4e7135dd097ec29a963
          4⤵
          • Suspicious use of WriteProcessMemory
          • Executes dropped EXE
          • Modifies registry class
          PID:3152
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\fontcrt\System.vbe"
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1000
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /c ""C:\fontcrt\7WCrkRKj3I45kvv0JqhYh5UzVIEFG5.bat" "
              6⤵
              • Suspicious use of WriteProcessMemory
              • Drops startup file
              PID:1696
              • C:\fontcrt\savesref.exe
                "C:\fontcrt\savesref.exe"
                7⤵
                • Executes dropped EXE
                • Suspicious use of AdjustPrivilegeToken
                • Drops startup file
                PID:1792
                • C:\Windows\system32\WerFault.exe
                  C:\Windows\system32\WerFault.exe -u -p 1792 -s 1692
                  8⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Program crash
                  • Suspicious behavior: EnumeratesProcesses
                  PID:1304
          • C:\fontcrt\Starter.exe
            "C:\fontcrt\Starter.exe"
            5⤵
            • Suspicious use of WriteProcessMemory
            • Executes dropped EXE
            • Adds Run entry to start application
            PID:1084
            • C:\Users\Admin\AppData\Roaming\Adobe\Adobe QuikInstall.exe
              "C:\Users\Admin\AppData\Roaming\Adobe\Adobe QuikInstall.exe"
              6⤵
              • Suspicious use of WriteProcessMemory
              • Executes dropped EXE
              PID:632
              • C:\Windows\SysWOW64\cmd.exe
                "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\Obsidium\Runtime Broker.exe
                7⤵
                  PID:1616
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\Vortex\SecurityHealthService.exe
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1640
                  • C:\Users\Admin\AppData\Roaming\Vortex\SecurityHealthService.exe
                    C:\Users\Admin\AppData\Roaming\Vortex\SecurityHealthService.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious behavior: EnumeratesProcesses
                    PID:2288
                • C:\Windows\SysWOW64\cmd.exe
                  "C:\Windows\System32\cmd.exe" /C C:\Users\Admin\AppData\Roaming\Sun\YourPhone.exe
                  7⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1548
                  • C:\Users\Admin\AppData\Roaming\Sun\YourPhone.exe
                    C:\Users\Admin\AppData\Roaming\Sun\YourPhone.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of AdjustPrivilegeToken
                    • Suspicious behavior: EnumeratesProcesses
                    PID:3644

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads