Analysis
-
max time kernel
113s -
max time network
121s -
platform
windows7_x64 -
resource
win7 -
submitted
29-07-2020 07:17
Static task
static1
Behavioral task
behavioral1
Sample
ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe
-
Size
149KB
-
MD5
b02ae33e75aeceecc4c4a42db8c44925
-
SHA1
b8be34ee03da34ba3946161bddbbcb87998355a5
-
SHA256
ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46
-
SHA512
64b880d9a7b874ede6e88f4c0e914bede1717766a779f1f6466594cb501838f4eea03aa02e568b1008bae7c7af4a88703be143d0b09ba77acf8bb0d4e194c0ec
Score
10/10
Malware Config
Signatures
-
Executes dropped EXE 1 IoCs
pid Process 1864 gennt.exe -
Deletes itself 1 IoCs
pid Process 1864 gennt.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1260 1904 WerFault.exe 25 -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 1260 WerFault.exe 1260 WerFault.exe 1260 WerFault.exe 1260 WerFault.exe -
Enumerates connected drives 3 TTPs
-
Loads dropped DLL 2 IoCs
pid Process 1492 ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe 1492 ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe -
Suspicious use of AdjustPrivilegeToken 1 IoCs
description pid Process Token: SeDebugPrivilege 1260 WerFault.exe -
Modifies WinLogon for persistence 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Windows NT\CurrentVersion\Winlogon\Shell = "explorer.exe, \"C:\\ProgramData\\31971a4405970f0358d8\\gennt.exe\"" gennt.exe -
Suspicious use of WriteProcessMemory 22 IoCs
description pid Process procid_target PID 1492 wrote to memory of 1864 1492 ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe 24 PID 1492 wrote to memory of 1864 1492 ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe 24 PID 1492 wrote to memory of 1864 1492 ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe 24 PID 1492 wrote to memory of 1864 1492 ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe 24 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1864 wrote to memory of 1904 1864 gennt.exe 25 PID 1904 wrote to memory of 1260 1904 secinit.exe 28 PID 1904 wrote to memory of 1260 1904 secinit.exe 28 PID 1904 wrote to memory of 1260 1904 secinit.exe 28 PID 1904 wrote to memory of 1260 1904 secinit.exe 28 PID 1864 wrote to memory of 828 1864 gennt.exe 29 PID 1864 wrote to memory of 828 1864 gennt.exe 29 PID 1864 wrote to memory of 828 1864 gennt.exe 29 PID 1864 wrote to memory of 828 1864 gennt.exe 29
Processes
-
C:\Users\Admin\AppData\Local\Temp\ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe"C:\Users\Admin\AppData\Local\Temp\ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\ProgramData\31971a4405970f0358d8\gennt.exeC:\ProgramData\31971a4405970f0358d8\gennt.exe "C:\Users\Admin\AppData\Local\Temp\ea28f52a318eeba6b22f449ec42f79a9deda765e9c87c20914f6bae9ad810c46.exe" ensgJJ2⤵
- Executes dropped EXE
- Deletes itself
- Modifies WinLogon for persistence
- Suspicious use of WriteProcessMemory
PID:1864 -
C:\Windows\SysWOW64\secinit.exeC:\ProgramData\31971a4405970f0358d8\gennt.exe3⤵
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1904 -s 1364⤵
- Program crash
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
PID:1260
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" powershell.exe -Command "& {Add-MpPreference -ExclusionPath C:\ProgramData\31971a4405970f0358d8}"3⤵PID:828
-
-