Analysis

  • max time kernel
    7s
  • platform
    windows7_x64
  • resource
    win7
  • submitted
    19-07-2020 16:48

Errors

Reason
Machine shutdown

General

  • Target

    action_2.0.8.9.vir.exe

  • Size

    380KB

  • MD5

    11b3ae60c845189bbec476f762476e69

  • SHA1

    28461e56f09813363ccc1fa686e48938afde7ec4

  • SHA256

    b6f0422e0ce7fd8f2ad23bc2ff2fab72b331e252810ce7a4582217a3bea32c67

  • SHA512

    4b235b560f0cd9d011017aec3ccbe5636a3c78905ecc401403ec2e01db809bfa3c4ecf973615ded1b54041c7e0a572ac9e6031fd56615a3621d4a9351c40c88e

Malware Config

Signatures

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Stops running service(s) 3 TTPs
  • Modifies Internet Explorer settings 1 TTPs 4 IoCs
  • Suspicious use of WriteProcessMemory 125 IoCs
  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

Processes

  • C:\Users\Admin\AppData\Local\Temp\action_2.0.8.9.vir.exe
    "C:\Users\Admin\AppData\Local\Temp\action_2.0.8.9.vir.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Loads dropped DLL
    • Adds Run key to start application
    • Suspicious use of WriteProcessMemory
    PID:1156
    • C:\Users\Admin\AppData\Roaming\Avbuug\teroq.exe
      "C:\Users\Admin\AppData\Roaming\Avbuug\teroq.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      • Executes dropped EXE
      PID:1240
      • C:\Windows\SysWOW64\cmd.exe
        cmd.exe /c sc stop wuauserv
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1244
        • C:\Windows\SysWOW64\sc.exe
          sc stop wuauserv
          4⤵
            PID:932
        • C:\Windows\SysWOW64\cmd.exe
          cmd.exe /c sc config wuauserv start= disabled
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:836
          • C:\Windows\SysWOW64\sc.exe
            sc config wuauserv start= disabled
            4⤵
              PID:456
          • C:\Windows\SysWOW64\cmd.exe
            cmd.exe /c sc stop wscsvc
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:1068
            • C:\Windows\SysWOW64\sc.exe
              sc stop wscsvc
              4⤵
                PID:1552
            • C:\Windows\SysWOW64\cmd.exe
              cmd.exe /c sc config wscsvc start= disabled
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:1520
              • C:\Windows\SysWOW64\sc.exe
                sc config wscsvc start= disabled
                4⤵
                  PID:1328
              • C:\Windows\SysWOW64\cmd.exe
                cmd.exe /c sc stop WinDefend
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1832
                • C:\Windows\SysWOW64\sc.exe
                  sc stop WinDefend
                  4⤵
                    PID:1796
                • C:\Windows\SysWOW64\cmd.exe
                  cmd.exe /c sc config WinDefend start= disabled
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1692
                  • C:\Windows\SysWOW64\sc.exe
                    sc config WinDefend start= disabled
                    4⤵
                      PID:1612
                  • C:\Windows\SysWOW64\cmd.exe
                    cmd.exe /c sc stop WdNisSvc
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1660
                    • C:\Windows\SysWOW64\sc.exe
                      sc stop WdNisSvc
                      4⤵
                        PID:1576
                    • C:\Windows\SysWOW64\cmd.exe
                      cmd.exe /c sc config WdNisSvc start= disabled
                      3⤵
                        PID:1904
                        • C:\Windows\SysWOW64\sc.exe
                          sc config WdNisSvc start= disabled
                          4⤵
                            PID:1844
                        • C:\Windows\SysWOW64\cmd.exe
                          cmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                          3⤵
                            PID:1900
                            • C:\Windows\SysWOW64\schtasks.exe
                              schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cache Maintenance" /Disable
                              4⤵
                                PID:1932
                            • C:\Windows\SysWOW64\cmd.exe
                              cmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                              3⤵
                                PID:1908
                                • C:\Windows\SysWOW64\schtasks.exe
                                  schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Cleanup" /Disable
                                  4⤵
                                    PID:2040
                                • C:\Windows\SysWOW64\cmd.exe
                                  cmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                  3⤵
                                    PID:1976
                                    • C:\Windows\SysWOW64\schtasks.exe
                                      schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Scheduled Scan" /Disable
                                      4⤵
                                        PID:368
                                    • C:\Windows\SysWOW64\cmd.exe
                                      cmd.exe /c schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                      3⤵
                                        PID:808
                                        • C:\Windows\SysWOW64\schtasks.exe
                                          schtasks /Change /TN "Microsoft\Windows\Windows Defender\Windows Defender Verification" /Disable
                                          4⤵
                                            PID:564
                                        • C:\Windows\SysWOW64\cmd.exe
                                          cmd.exe /c sc stop MpsSvc
                                          3⤵
                                            PID:1092
                                            • C:\Windows\SysWOW64\sc.exe
                                              sc stop MpsSvc
                                              4⤵
                                                PID:2016
                                            • C:\Windows\SysWOW64\cmd.exe
                                              cmd.exe /c sc config MpsSvc start= disabled
                                              3⤵
                                                PID:1184
                                                • C:\Windows\SysWOW64\sc.exe
                                                  sc config MpsSvc start= disabled
                                                  4⤵
                                                    PID:1584
                                                • C:\Windows\SysWOW64\mstsc.exe
                                                  "C:\Windows\SysWOW64\mstsc.exe"
                                                  3⤵
                                                  • Modifies Internet Explorer settings
                                                  PID:1192
                                              • C:\Windows\SysWOW64\cmd.exe
                                                cmd /c ""C:\Users\Admin\AppData\Local\Temp\tmp9f3bf52b.bat" C:\Users\Admin\AppData\Local\Temp\action_2.0.8.9.vir.exe"
                                                2⤵
                                                • Deletes itself
                                                PID:1444
                                            • C:\Windows\system32\LogonUI.exe
                                              "LogonUI.exe" /flags:0x0
                                              1⤵
                                                PID:624
                                              • C:\Windows\system32\LogonUI.exe
                                                "LogonUI.exe" /flags:0x1
                                                1⤵
                                                  PID:1556

                                                Network

                                                MITRE ATT&CK Matrix ATT&CK v6

                                                Persistence

                                                Registry Run Keys / Startup Folder

                                                1
                                                T1060

                                                Modify Existing Service

                                                2
                                                T1031

                                                Defense Evasion

                                                Modify Registry

                                                3
                                                T1112

                                                Disabling Security Tools

                                                2
                                                T1089

                                                Credential Access

                                                Credentials in Files

                                                1
                                                T1081

                                                Collection

                                                Data from Local System

                                                1
                                                T1005

                                                Impact

                                                Service Stop

                                                1
                                                T1489

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Temp\tmp9f3bf52b.bat
                                                • C:\Users\Admin\AppData\Roaming\Avbuug\teroq.exe
                                                • \Users\Admin\AppData\Roaming\Avbuug\teroq.exe
                                                • \Users\Admin\AppData\Roaming\Avbuug\teroq.exe
                                                • memory/368-29-0x0000000000000000-mapping.dmp
                                                • memory/456-11-0x0000000000000000-mapping.dmp
                                                • memory/564-31-0x0000000000000000-mapping.dmp
                                                • memory/808-30-0x0000000000000000-mapping.dmp
                                                • memory/836-10-0x0000000000000000-mapping.dmp
                                                • memory/932-9-0x0000000000000000-mapping.dmp
                                                • memory/1068-12-0x0000000000000000-mapping.dmp
                                                • memory/1092-32-0x0000000000000000-mapping.dmp
                                                • memory/1156-0-0x00000000005DF000-0x00000000005E0000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/1184-34-0x0000000000000000-mapping.dmp
                                                • memory/1192-36-0x0000000000080000-0x00000000000CD000-memory.dmp
                                                  Filesize

                                                  308KB

                                                • memory/1192-37-0x0000000000080000-0x00000000000CD000-memory.dmp
                                                  Filesize

                                                  308KB

                                                • memory/1192-38-0x0000000000000000-mapping.dmp
                                                • memory/1240-5-0x00000000002EE000-0x00000000002EF000-memory.dmp
                                                  Filesize

                                                  4KB

                                                • memory/1240-3-0x0000000000000000-mapping.dmp
                                                • memory/1244-6-0x0000000000000000-mapping.dmp
                                                • memory/1328-15-0x0000000000000000-mapping.dmp
                                                • memory/1444-7-0x0000000000000000-mapping.dmp
                                                • memory/1520-14-0x0000000000000000-mapping.dmp
                                                • memory/1552-13-0x0000000000000000-mapping.dmp
                                                • memory/1576-21-0x0000000000000000-mapping.dmp
                                                • memory/1584-35-0x0000000000000000-mapping.dmp
                                                • memory/1612-19-0x0000000000000000-mapping.dmp
                                                • memory/1660-20-0x0000000000000000-mapping.dmp
                                                • memory/1692-18-0x0000000000000000-mapping.dmp
                                                • memory/1796-17-0x0000000000000000-mapping.dmp
                                                • memory/1832-16-0x0000000000000000-mapping.dmp
                                                • memory/1844-23-0x0000000000000000-mapping.dmp
                                                • memory/1900-24-0x0000000000000000-mapping.dmp
                                                • memory/1904-22-0x0000000000000000-mapping.dmp
                                                • memory/1908-26-0x0000000000000000-mapping.dmp
                                                • memory/1932-25-0x0000000000000000-mapping.dmp
                                                • memory/1976-28-0x0000000000000000-mapping.dmp
                                                • memory/2016-33-0x0000000000000000-mapping.dmp
                                                • memory/2040-27-0x0000000000000000-mapping.dmp