Analysis
-
max time kernel
150s -
max time network
22s -
platform
windows7_x64 -
resource
win7 -
submitted
02-09-2020 11:53
Static task
static1
Behavioral task
behavioral1
Sample
MediaCreationTool1909.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MediaCreationTool1909.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
MediaCreationTool1909.exe
-
Size
18.4MB
-
MD5
d0ba2b1c91124ee4a250c6c53f545f1f
-
SHA1
0352292fc21c8dd442358f2ff4fa8eded01b7dca
-
SHA256
8237794f0fffb298040ed59045b679579fa6e1b66703ec2bf5353e71499c663e
-
SHA512
99d45e22f36f15777e789e54d6a5410a335bd344d009d863afd3c35ce53a6f4811b7e40f912b6da35725e121fff11e51a3fb9659a45a2f7701afc9ab407d7399
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SetupHost.ExeDiagTrackRunner.exepid process 1684 SetupHost.Exe 308 DiagTrackRunner.exe -
Loads dropped DLL 19 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.ExeDiagTrackRunner.exepid process 1308 MediaCreationTool1909.exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 1684 SetupHost.Exe 308 DiagTrackRunner.exe -
JavaScript code in executable 4 IoCs
Processes:
resource yara_rule C:\$Windows.~WS\Sources\SetupPlatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js -
Drops file in Windows directory 1 IoCs
Processes:
MediaCreationTool1909.exedescription ioc process File opened for modification C:\Windows\Logs\MoSetup\BlueBox.log MediaCreationTool1909.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
DiagTrackRunner.exeSetupHost.Exedescription ioc process Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiagTrackRunner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz DiagTrackRunner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupHost.Exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SetupHost.Exe -
NTFS ADS 1 IoCs
Processes:
SetupHost.Exedescription ioc process File created C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl:$ETLUNIQUECVDATA SetupHost.Exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
SetupHost.Exepid process 1684 SetupHost.Exe 1684 SetupHost.Exe -
Suspicious use of AdjustPrivilegeToken 58 IoCs
Processes:
MediaCreationTool1909.exe7zG.exeSetupHost.Exe7zG.exeDiagTrackRunner.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exedescription pid process Token: SeBackupPrivilege 1308 MediaCreationTool1909.exe Token: SeRestorePrivilege 1308 MediaCreationTool1909.exe Token: SeBackupPrivilege 1308 MediaCreationTool1909.exe Token: SeRestorePrivilege 1308 MediaCreationTool1909.exe Token: SeRestorePrivilege 1628 7zG.exe Token: 35 1628 7zG.exe Token: SeSecurityPrivilege 1628 7zG.exe Token: SeSecurityPrivilege 1628 7zG.exe Token: SeBackupPrivilege 1684 SetupHost.Exe Token: SeRestorePrivilege 1684 SetupHost.Exe Token: SeRestorePrivilege 560 7zG.exe Token: 35 560 7zG.exe Token: SeSecurityPrivilege 560 7zG.exe Token: SeSecurityPrivilege 560 7zG.exe Token: SeBackupPrivilege 1684 SetupHost.Exe Token: SeRestorePrivilege 1684 SetupHost.Exe Token: SeDebugPrivilege 308 DiagTrackRunner.exe Token: SeDebugPrivilege 308 DiagTrackRunner.exe Token: SeDebugPrivilege 308 DiagTrackRunner.exe Token: SeDebugPrivilege 308 DiagTrackRunner.exe Token: SeBackupPrivilege 1308 MediaCreationTool1909.exe Token: SeRestorePrivilege 1308 MediaCreationTool1909.exe Token: SeRestorePrivilege 1936 7zG.exe Token: 35 1936 7zG.exe Token: SeSecurityPrivilege 1936 7zG.exe Token: SeSecurityPrivilege 1936 7zG.exe Token: SeRestorePrivilege 824 7zG.exe Token: 35 824 7zG.exe Token: SeSecurityPrivilege 824 7zG.exe Token: SeSecurityPrivilege 824 7zG.exe Token: SeRestorePrivilege 1744 7zG.exe Token: 35 1744 7zG.exe Token: SeSecurityPrivilege 1744 7zG.exe Token: SeSecurityPrivilege 1744 7zG.exe Token: SeRestorePrivilege 280 7zG.exe Token: 35 280 7zG.exe Token: SeSecurityPrivilege 280 7zG.exe Token: SeSecurityPrivilege 280 7zG.exe Token: SeRestorePrivilege 1076 7zG.exe Token: 35 1076 7zG.exe Token: SeSecurityPrivilege 1076 7zG.exe Token: SeSecurityPrivilege 1076 7zG.exe Token: SeRestorePrivilege 1028 7zG.exe Token: 35 1028 7zG.exe Token: SeSecurityPrivilege 1028 7zG.exe Token: SeSecurityPrivilege 1028 7zG.exe Token: SeRestorePrivilege 1580 7zG.exe Token: 35 1580 7zG.exe Token: SeSecurityPrivilege 1580 7zG.exe Token: SeSecurityPrivilege 1580 7zG.exe Token: SeRestorePrivilege 888 7zG.exe Token: 35 888 7zG.exe Token: SeSecurityPrivilege 888 7zG.exe Token: SeSecurityPrivilege 888 7zG.exe Token: SeRestorePrivilege 860 7zG.exe Token: 35 860 7zG.exe Token: SeSecurityPrivilege 860 7zG.exe Token: SeSecurityPrivilege 860 7zG.exe -
Suspicious use of FindShellTrayWindow 11 IoCs
Processes:
7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exe7zG.exepid process 1628 7zG.exe 560 7zG.exe 1936 7zG.exe 824 7zG.exe 1744 7zG.exe 280 7zG.exe 1076 7zG.exe 1028 7zG.exe 1580 7zG.exe 888 7zG.exe 860 7zG.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exepid process 1308 MediaCreationTool1909.exe 1684 SetupHost.Exe -
Suspicious use of WriteProcessMemory 11 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exedescription pid process target process PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1308 wrote to memory of 1684 1308 MediaCreationTool1909.exe SetupHost.Exe PID 1684 wrote to memory of 308 1684 SetupHost.Exe DiagTrackRunner.exe PID 1684 wrote to memory of 308 1684 SetupHost.Exe DiagTrackRunner.exe PID 1684 wrote to memory of 308 1684 SetupHost.Exe DiagTrackRunner.exe PID 1684 wrote to memory of 308 1684 SetupHost.Exe DiagTrackRunner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"1⤵
- Loads dropped DLL
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\$Windows.~WS\Sources\SetupHost.Exe"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web2⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1684 -
C:\$Windows.~WS\Sources\DiagTrackRunner.exeC:\$Windows.~WS\Sources\DiagTrackRunner.exe /UploadEtlFilesOnly3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
PID:308
-
-
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap2721:80:7zEvent27393 -t7z -seml. -sae -- "ReadConfirm.7z"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1628
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:320
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\RestoreCompress\" -ad -an -ai#7zMap23709:88:7zEvent324571⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:560
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1032
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\UninstallExpand\" -ad -an -ai#7zMap27710:88:7zEvent245421⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1936
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\WriteDeny\" -ad -an -ai#7zMap24489:78:7zEvent206991⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:824
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\RenameMerge\" -ad -an -ai#7zMap30287:80:7zEvent161471⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1744
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" a -i#7zMap24658:80:7zEvent30606 -ad -saa -- "C:\Users\Admin\Desktop\ReadConfirm"1⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:280
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\ReadConfirm\" -ad -an -ai#7zMap22700:80:7zEvent21141⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1076
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\UnregisterConvert\" -ad -an -ai#7zMap7039:92:7zEvent276131⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1028
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\CopyStop\" -ad -an -ai#7zMap3092:80:7zEvent69411⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:1580
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\ExportConvertFrom\" -ad -an -ai#7zMap5017:96:7zEvent15311⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:888
-
C:\Program Files\7-Zip\7zG.exe"C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Documents\Files\" -ad -an -ai#7zMap16214:74:7zEvent38381⤵
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
PID:860