Analysis
-
max time kernel
146s -
max time network
138s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
02-09-2020 11:53
Static task
static1
Behavioral task
behavioral1
Sample
MediaCreationTool1909.exe
Resource
win7
windows7_x64
0 signatures
0 seconds
Behavioral task
behavioral2
Sample
MediaCreationTool1909.exe
Resource
win10v200722
windows10_x64
0 signatures
0 seconds
General
-
Target
MediaCreationTool1909.exe
-
Size
18.4MB
-
MD5
d0ba2b1c91124ee4a250c6c53f545f1f
-
SHA1
0352292fc21c8dd442358f2ff4fa8eded01b7dca
-
SHA256
8237794f0fffb298040ed59045b679579fa6e1b66703ec2bf5353e71499c663e
-
SHA512
99d45e22f36f15777e789e54d6a5410a335bd344d009d863afd3c35ce53a6f4811b7e40f912b6da35725e121fff11e51a3fb9659a45a2f7701afc9ab407d7399
Score
8/10
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SetupHost.ExeDiagTrackRunner.exepid process 3840 SetupHost.Exe 3720 DiagTrackRunner.exe -
Loads dropped DLL 17 IoCs
Processes:
SetupHost.ExeDiagTrackRunner.exepid process 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3720 DiagTrackRunner.exe -
JavaScript code in executable 4 IoCs
Processes:
resource yara_rule C:\$Windows.~WS\Sources\SetupPlatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js -
Drops file in Windows directory 6 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exesvchost.exedescription ioc process File opened for modification C:\Windows\Logs\MoSetup\BlueBox.log MediaCreationTool1909.exe File opened for modification C:\Windows\setupact.log SetupHost.Exe File opened for modification C:\Windows\setuperr.log SetupHost.Exe File opened for modification C:\Windows\diagerr.xml SetupHost.Exe File opened for modification C:\Windows\diagwrn.xml SetupHost.Exe File opened for modification C:\Windows\ServiceProfiles\LocalService\winhttp\cachev3.dat svchost.exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
SetupHost.ExeDiagTrackRunner.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupHost.Exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SetupHost.Exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiagTrackRunner.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz DiagTrackRunner.exe -
Modifies data under HKEY_USERS 5 IoCs
Processes:
svchost.exedescription ioc process Set value (data) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionTime = 08ed55f13081d601 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecision = "0" svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad svchost.exe Key created \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7 svchost.exe Set value (int) \REGISTRY\USER\S-1-5-19\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Wpad\0e-3e-6f-2c-c8-c7\WpadDecisionReason = "1" svchost.exe -
NTFS ADS 1 IoCs
Processes:
SetupHost.Exedescription ioc process File created C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl:$ETLUNIQUECVDATA SetupHost.Exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SetupHost.Exepid process 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe 3840 SetupHost.Exe -
Suspicious use of AdjustPrivilegeToken 16 IoCs
Processes:
svchost.exeMediaCreationTool1909.exeSetupHost.ExeDiagTrackRunner.exedescription pid process Token: SeShutdownPrivilege 2528 svchost.exe Token: SeCreatePagefilePrivilege 2528 svchost.exe Token: SeBackupPrivilege 408 MediaCreationTool1909.exe Token: SeRestorePrivilege 408 MediaCreationTool1909.exe Token: SeBackupPrivilege 408 MediaCreationTool1909.exe Token: SeRestorePrivilege 408 MediaCreationTool1909.exe Token: SeBackupPrivilege 3840 SetupHost.Exe Token: SeRestorePrivilege 3840 SetupHost.Exe Token: SeBackupPrivilege 3840 SetupHost.Exe Token: SeRestorePrivilege 3840 SetupHost.Exe Token: SeRestorePrivilege 3840 SetupHost.Exe Token: SeBackupPrivilege 3840 SetupHost.Exe Token: SeDebugPrivilege 3720 DiagTrackRunner.exe Token: SeDebugPrivilege 3720 DiagTrackRunner.exe Token: SeDebugPrivilege 3720 DiagTrackRunner.exe Token: SeDebugPrivilege 3720 DiagTrackRunner.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exepid process 408 MediaCreationTool1909.exe 3840 SetupHost.Exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exedescription pid process target process PID 408 wrote to memory of 3840 408 MediaCreationTool1909.exe SetupHost.Exe PID 408 wrote to memory of 3840 408 MediaCreationTool1909.exe SetupHost.Exe PID 408 wrote to memory of 3840 408 MediaCreationTool1909.exe SetupHost.Exe PID 3840 wrote to memory of 3720 3840 SetupHost.Exe DiagTrackRunner.exe PID 3840 wrote to memory of 3720 3840 SetupHost.Exe DiagTrackRunner.exe PID 3840 wrote to memory of 3720 3840 SetupHost.Exe DiagTrackRunner.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
DiagTrackRunner.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection DiagTrackRunner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:408 -
C:\$Windows.~WS\Sources\SetupHost.Exe"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web2⤵
- Executes dropped EXE
- Loads dropped DLL
- Drops file in Windows directory
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3840 -
C:\$Windows.~WS\Sources\DiagTrackRunner.exeC:\$Windows.~WS\Sources\DiagTrackRunner.exe /UploadEtlFilesOnly3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:3720
-
-
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k LocalService -s WinHttpAutoProxySvc1⤵
- Drops file in Windows directory
- Modifies data under HKEY_USERS
- Suspicious use of AdjustPrivilegeToken
PID:2528
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:3636