Resubmissions

28-08-2020 12:47

200828-nd915gcv5n 8

28-08-2020 12:45

200828-q7w77zyk92 8

28-08-2020 12:39

200828-h3kmc18276 8

Analysis

  • max time kernel
    144s
  • max time network
    20s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    28-08-2020 12:45

General

  • Target

    myfile.exe

  • Size

    4.3MB

  • MD5

    0a438448cebd370318b5294775e2405c

  • SHA1

    60abd37bf94ee406653af60e5b72f1f69f646308

  • SHA256

    1e40bce6e476e4c0485b3f813cff5d493b1e07f52a89b56a31765529b809ea33

  • SHA512

    dc21a068d6aa3ce93a399d2b636a4dc17fd9b2f60c921eaadaef4eb0049c4ef5d1c09479c906660d0fa7bb7e688cdae54a36d9e73e35ac209e469a862c992976

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Enumerates connected drives 3 TTPs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Modifies Control Panel 1 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 3 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 35 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\myfile.exe
    "C:\Users\Admin\AppData\Local\Temp\myfile.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1620
    • C:\Windows\system32\cmd.exe
      "C:\Windows\sysnative\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\B201.tmp\B202.tmp\B203.bat C:\Users\Admin\AppData\Local\Temp\myfile.exe"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1788
      • C:\Windows\system32\tree.com
        tree
        3⤵
          PID:1192
        • C:\Windows\system32\tree.com
          tree
          3⤵
            PID:1864
          • C:\Windows\system32\tree.com
            tree
            3⤵
              PID:1876
            • C:\Windows\system32\tree.com
              tree
              3⤵
                PID:1888
              • C:\Windows\system32\tree.com
                tree
                3⤵
                  PID:1900
                • C:\Users\Admin\Desktop\HexInformation.exe
                  HexInformation.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious use of FindShellTrayWindow
                  PID:1820
                • C:\Users\Admin\Desktop\HexDecryptor.exe
                  HexDecryptor.exe
                  3⤵
                  • Executes dropped EXE
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious use of WriteProcessMemory
                  PID:1816
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd" /c "C:\Users\Admin\AppData\Local\Temp\B8C4.tmp\B8C5.tmp\B8C6.bat C:\Users\Admin\Desktop\HexDecryptor.exe"
                    4⤵
                      PID:1440
                  • C:\Users\Admin\Desktop\HexLocker.exe
                    HexLocker.exe
                    3⤵
                    • Executes dropped EXE
                    • Sets desktop wallpaper using registry
                    • Modifies Control Panel
                    • Suspicious behavior: CmdExeWriteProcessMemorySpam
                    PID:708

              Network

              MITRE ATT&CK Matrix ATT&CK v6

              Defense Evasion

              Modify Registry

              1
              T1112

              Discovery

              Query Registry

              1
              T1012

              Peripheral Device Discovery

              1
              T1120

              System Information Discovery

              1
              T1082

              Impact

              Defacement

              1
              T1491

              Replay Monitor

              Loading Replay Monitor...

              Downloads

              • C:\Users\Admin\AppData\Local\Temp\B201.tmp\B202.tmp\B203.bat
              • C:\Users\Admin\AppData\Local\Temp\B8C4.tmp\B8C5.tmp\B8C6.bat
              • C:\Users\Admin\AppData\Local\Temp\HexDCIF.hex
              • C:\Users\Admin\AppData\Local\Temp\HexIF.hex
              • C:\Users\Admin\AppData\Local\Temp\HexLK.hex
              • C:\Users\Admin\AppData\Local\Temp\rd000db.dll
              • C:\Users\Admin\Desktop\HexDecryptor.exe
              • C:\Users\Admin\Desktop\HexDecryptor.exe
              • C:\Users\Admin\Desktop\HexInformation.exe
              • C:\Users\Admin\Desktop\HexInformation.exe
              • C:\Users\Admin\Desktop\HexLocker.exe
              • C:\Users\Admin\Desktop\HexLocker.exe
              • C:\Users\Admin\Desktop\Lock.ConfirmUse.7z
              • C:\Users\Admin\Desktop\Lock.ConvertConvertFrom.odp
              • C:\Users\Admin\Desktop\Lock.ConvertDisable.potx
              • C:\Users\Admin\Desktop\Lock.DenyClear.xht
              • C:\Users\Admin\Desktop\Lock.DisableOptimize.png
              • C:\Users\Admin\Desktop\Lock.DisableRename.rtf
              • C:\Users\Admin\Desktop\Lock.DisableRename.rtf - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.DisableRename.rtf - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.DisableRename.rtf - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.EnableRestore.wav
              • C:\Users\Admin\Desktop\Lock.EnableRestore.wav - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.EnableRestore.wav - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.EnableRestore.wav - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.GetOut.vsd
              • C:\Users\Admin\Desktop\Lock.GetOut.vsd - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.GetOut.vsd - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.GetOut.vsd - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.GrantResolve.asx
              • C:\Users\Admin\Desktop\Lock.GrantResolve.asx - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.GrantResolve.asx - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.GrantResolve.asx - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.GroupConvert.vsd
              • C:\Users\Admin\Desktop\Lock.GroupConvert.vsd - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.GroupConvert.vsd - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.GroupConvert.vsd - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.HexDecryptor.exe
              • C:\Users\Admin\Desktop\Lock.HexDecryptor.exe - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.HexDecryptor.exe - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.HexDecryptor.exe - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.HexInformation.exe
              • C:\Users\Admin\Desktop\Lock.HexInformation.exe - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.HexInformation.exe - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.HexInformation.exe - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.HexLocker.exe
              • C:\Users\Admin\Desktop\Lock.HexLocker.exe - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.HexLocker.exe - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.HexLocker.exe - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.HideExit.dotx
              • C:\Users\Admin\Desktop\Lock.HideExit.dotx - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.HideExit.dotx - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.HideExit.dotx - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.ImportMerge.ppsx
              • C:\Users\Admin\Desktop\Lock.ImportMerge.ppsx - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.ImportMerge.ppsx - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.ImportMerge.ppsx - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.InstallReceive (2).lnk
              • C:\Users\Admin\Desktop\Lock.InstallReceive (3).lnk
              • C:\Users\Admin\Desktop\Lock.InstallReceive (4).lnk
              • C:\Users\Admin\Desktop\Lock.InstallReceive.lnk
              • C:\Users\Admin\Desktop\Lock.MeasureRename.mpe
              • C:\Users\Admin\Desktop\Lock.MeasureRename.mpe - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.MeasureRename.mpe - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.MeasureRename.mpe - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.OptimizeBackup.otf
              • C:\Users\Admin\Desktop\Lock.OptimizeBackup.otf - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.OptimizeBackup.otf - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.OptimizeBackup.otf - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.PublishMerge.htm
              • C:\Users\Admin\Desktop\Lock.PublishMerge.htm - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.PublishMerge.htm - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.PublishMerge.htm - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.ReceiveAssert.odp
              • C:\Users\Admin\Desktop\Lock.ReceiveAssert.odp - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.ReceiveAssert.odp - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.ReceiveAssert.odp - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.ResizeConvertTo.emf
              • C:\Users\Admin\Desktop\Lock.ResizeConvertTo.emf - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.ResizeConvertTo.emf - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.ResizeConvertTo.emf - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.SendTest.iso
              • C:\Users\Admin\Desktop\Lock.SendTest.iso - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.SendTest.iso - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.SendTest.iso - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.StartUpdate.rm
              • C:\Users\Admin\Desktop\Lock.StartUpdate.rm - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.StartUpdate.rm - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.StartUpdate.rm - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.StepSearch.txt
              • C:\Users\Admin\Desktop\Lock.StepSearch.txt - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.StepSearch.txt - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.StepSearch.txt - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.SwitchSubmit.dib
              • C:\Users\Admin\Desktop\Lock.SwitchSubmit.dib - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.SwitchSubmit.dib - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.SwitchSubmit.dib - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.SyncUnpublish.js
              • C:\Users\Admin\Desktop\Lock.SyncUnpublish.js - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.SyncUnpublish.js - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.SyncUnpublish.js - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.UnlockGroup.dll
              • C:\Users\Admin\Desktop\Lock.UnlockGroup.dll - Shortcut (2).lnk
              • C:\Users\Admin\Desktop\Lock.UnlockGroup.dll - Shortcut (3).lnk
              • C:\Users\Admin\Desktop\Lock.UnlockGroup.dll - Shortcut.lnk
              • C:\Users\Admin\Desktop\Lock.desktop.ini
              • memory/628-28-0x000007FEF8510000-0x000007FEF878A000-memory.dmp
                Filesize

                2.5MB

              • memory/708-17-0x0000000000000000-mapping.dmp
              • memory/708-18-0x0000000000000000-mapping.dmp
              • memory/1192-2-0x0000000000000000-mapping.dmp
              • memory/1440-22-0x0000000000000000-mapping.dmp
              • memory/1788-0-0x0000000000000000-mapping.dmp
              • memory/1816-15-0x0000000000000000-mapping.dmp
              • memory/1816-14-0x0000000000000000-mapping.dmp
              • memory/1820-26-0x0000000001070000-0x0000000001071000-memory.dmp
                Filesize

                4KB

              • memory/1820-24-0x0000000074650000-0x0000000074D3E000-memory.dmp
                Filesize

                6.9MB

              • memory/1820-12-0x0000000000000000-mapping.dmp
              • memory/1820-11-0x0000000000000000-mapping.dmp
              • memory/1864-3-0x0000000000000000-mapping.dmp
              • memory/1876-4-0x0000000000000000-mapping.dmp
              • memory/1888-5-0x0000000000000000-mapping.dmp
              • memory/1900-6-0x0000000000000000-mapping.dmp