Analysis
-
max time kernel
138s -
max time network
109s -
platform
windows7_x64 -
resource
win7v200430 -
submitted
14-07-2020 16:36
Static task
static1
Behavioral task
behavioral1
Sample
ReviewDocument.exe
Resource
win7v200430
Behavioral task
behavioral2
Sample
ReviewDocument.exe
Resource
win10
General
-
Target
ReviewDocument.exe
-
Size
178KB
-
MD5
9bd3bbc082d0b3446fd456d750a8bbbe
-
SHA1
d50d739d91ff82ad31a6227ba734b6658f1a577a
-
SHA256
63913936a820bf5e79bccb7ac74b80f78fae9aec0f2dbfa097f057227a2e4aa2
-
SHA512
c0ba3a8a7a305dfc2539ef0ead8e418795532eb39a70571296e06d5b27c2cdd9425165dd88afbb90511c2bb68be5bd587c5233743a395d0b3dfe76d90a42bb7b
Malware Config
Extracted
buer
https://162.244.81.87/
http://162.244.81.87:8080/
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\327dc086d52122b7ba88\\gennt.exe\"" gennt.exe -
Buer Loader 1 IoCs
Detects Buer loader in memory or disk.
resource yara_rule behavioral1/memory/1312-0-0x00000000001A0000-0x00000000001AC000-memory.dmp buer -
Executes dropped EXE 1 IoCs
pid Process 1740 gennt.exe -
Deletes itself 1 IoCs
pid Process 1740 gennt.exe -
Loads dropped DLL 1 IoCs
pid Process 1312 ReviewDocument.exe -
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Z: gennt.exe File opened (read-only) \??\B: gennt.exe File opened (read-only) \??\I: gennt.exe File opened (read-only) \??\P: gennt.exe File opened (read-only) \??\Q: gennt.exe File opened (read-only) \??\V: gennt.exe File opened (read-only) \??\W: gennt.exe File opened (read-only) \??\Y: gennt.exe File opened (read-only) \??\U: gennt.exe File opened (read-only) \??\E: gennt.exe File opened (read-only) \??\H: gennt.exe File opened (read-only) \??\K: gennt.exe File opened (read-only) \??\L: gennt.exe File opened (read-only) \??\M: gennt.exe File opened (read-only) \??\R: gennt.exe File opened (read-only) \??\T: gennt.exe File opened (read-only) \??\G: gennt.exe File opened (read-only) \??\J: gennt.exe File opened (read-only) \??\N: gennt.exe File opened (read-only) \??\O: gennt.exe File opened (read-only) \??\S: gennt.exe File opened (read-only) \??\A: gennt.exe File opened (read-only) \??\F: gennt.exe File opened (read-only) \??\X: gennt.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: EnumeratesProcesses 1 IoCs
pid Process 1740 gennt.exe -
Suspicious use of WriteProcessMemory 20 IoCs
description pid Process procid_target PID 1312 wrote to memory of 1740 1312 ReviewDocument.exe 27 PID 1312 wrote to memory of 1740 1312 ReviewDocument.exe 27 PID 1312 wrote to memory of 1740 1312 ReviewDocument.exe 27 PID 1312 wrote to memory of 1740 1312 ReviewDocument.exe 27 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 1848 1740 gennt.exe 29 PID 1740 wrote to memory of 520 1740 gennt.exe 30 PID 1740 wrote to memory of 520 1740 gennt.exe 30 PID 1740 wrote to memory of 520 1740 gennt.exe 30 PID 1740 wrote to memory of 520 1740 gennt.exe 30
Processes
-
C:\Users\Admin\AppData\Local\Temp\ReviewDocument.exe"C:\Users\Admin\AppData\Local\Temp\ReviewDocument.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1312 -
C:\ProgramData\327dc086d52122b7ba88\gennt.exeC:\ProgramData\327dc086d52122b7ba88\gennt.exe "C:\Users\Admin\AppData\Local\Temp\ReviewDocument.exe" ensgJJ2⤵
- Modifies WinLogon for persistence
- Executes dropped EXE
- Deletes itself
- Enumerates connected drives
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:1740 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\327dc086d52122b7ba88\gennt.exe3⤵PID:1848
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\327dc086d52122b7ba88}"3⤵PID:520
-
-