Analysis

  • max time kernel
    151s
  • max time network
    157s
  • platform
    windows7_x64
  • resource
    win7v200722
  • submitted
    12-09-2020 01:31

General

  • Target

    MediaCreationTool1909.exe

  • Size

    18.4MB

  • MD5

    d0ba2b1c91124ee4a250c6c53f545f1f

  • SHA1

    0352292fc21c8dd442358f2ff4fa8eded01b7dca

  • SHA256

    8237794f0fffb298040ed59045b679579fa6e1b66703ec2bf5353e71499c663e

  • SHA512

    99d45e22f36f15777e789e54d6a5410a335bd344d009d863afd3c35ce53a6f4811b7e40f912b6da35725e121fff11e51a3fb9659a45a2f7701afc9ab407d7399

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 19 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • JavaScript code in executable 4 IoCs
  • Modifies service 2 TTPs 2 IoCs
  • Drops file in Windows directory 1 IoCs
  • Checks processor information in registry 2 TTPs 4 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Gathers network information 2 TTPs 2 IoCs

    Uses commandline utility to view network configuration.

  • Modifies Internet Explorer settings 1 TTPs 56 IoCs
  • NTFS ADS 1 IoCs
  • Runs ping.exe 1 TTPs 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 19 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 30 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe
    "C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"
    1⤵
    • Loads dropped DLL
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1132
    • C:\$Windows.~WS\Sources\SetupHost.Exe
      "C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web
      2⤵
      • Executes dropped EXE
      • Checks computer location settings
      • Loads dropped DLL
      • Checks processor information in registry
      • NTFS ADS
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:276
      • C:\$Windows.~WS\Sources\DiagTrackRunner.exe
        C:\$Windows.~WS\Sources\DiagTrackRunner.exe /UploadEtlFilesOnly
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks processor information in registry
        • Suspicious use of AdjustPrivilegeToken
        PID:1220
  • C:\Program Files\7-Zip\7zG.exe
    "C:\Program Files\7-Zip\7zG.exe" x -o"C:\Users\Admin\Desktop\UninstallWatch\" -ad -an -ai#7zMap6999:86:7zEvent17565
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    PID:1612
  • C:\Windows\System32\vdsldr.exe
    C:\Windows\System32\vdsldr.exe -Embedding
    1⤵
      PID:2000
    • C:\Windows\System32\vdsldr.exe
      C:\Windows\System32\vdsldr.exe -Embedding
      1⤵
        PID:868
      • C:\Program Files\Internet Explorer\iexplore.exe
        "C:\Program Files\Internet Explorer\iexplore.exe" https://go.microsoft.com/fwlink/?LinkId=724295
        1⤵
        • Modifies Internet Explorer settings
        • Suspicious use of FindShellTrayWindow
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1172
        • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
          "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1172 CREDAT:275457 /prefetch:2
          2⤵
          • Enumerates connected drives
          • Modifies Internet Explorer settings
          • Suspicious use of SetWindowsHookEx
          PID:596
      • C:\Windows\system32\cmd.exe
        "C:\Windows\system32\cmd.exe"
        1⤵
        • Suspicious use of WriteProcessMemory
        PID:1144
        • C:\Windows\system32\PING.EXE
          ping www.alienvault.com
          2⤵
          • Runs ping.exe
          PID:300
        • C:\Windows\system32\ipconfig.exe
          ipconfig /all
          2⤵
          • Modifies service
          • Gathers network information
          PID:1496
        • C:\Windows\system32\NETSTAT.EXE
          netstat -a -n -o
          2⤵
          • Gathers network information
          • Suspicious use of AdjustPrivilegeToken
          PID:1584
        • C:\Windows\system32\PING.EXE
          ping www.fbi.gov
          2⤵
          • Runs ping.exe
          PID:1456
        • C:\Windows\system32\PING.EXE
          ping www.reddit.com
          2⤵
          • Runs ping.exe
          PID:2020

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • C:\$Windows.~WS\Sources\DiagTrackRunner.exe

      • C:\$Windows.~WS\Sources\DiagTrackRunner.exe

      • C:\$Windows.~WS\Sources\MediaSetupUIMgr.dll

      • C:\$Windows.~WS\Sources\SetupCore.dll

      • C:\$Windows.~WS\Sources\SetupHost.Exe

      • C:\$Windows.~WS\Sources\SetupHost.exe

      • C:\$Windows.~WS\Sources\SetupMgr.dll

      • C:\$Windows.~WS\Sources\SetupPlatform.dll

      • C:\$Windows.~WS\Sources\SetupPlatform.ini

      • C:\$Windows.~WS\Sources\WDSCORE.dll

      • C:\$Windows.~WS\Sources\WDSUTIL.dll

      • C:\$Windows.~WS\Sources\WINDLP.DLL

      • C:\$Windows.~WS\Sources\diagtrack.dll

      • C:\$Windows.~WS\Sources\products.cab

      • C:\$Windows.~WS\Sources\products.xml

      • C:\$Windows.~WS\Sources\setupplatform.cfg

      • C:\$Windows.~WS\Sources\unbcl.dll

      • C:\$Windows.~WS\Sources\wpx.dll

      • C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\94308059B57B3142E455B38A6EB92015

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_D9817BD5013875AD517DA73475345203

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\28xp72e\imagestore.dat

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\N1IXFKVV.txt

      • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Cookies\XXCXQZRK.txt

      • \$Windows.~WS\Sources\DiagTrack.dll

      • \$Windows.~WS\Sources\DiagTrackRunner.exe

      • \$Windows.~WS\Sources\DiagTrackRunner.exe

      • \$Windows.~WS\Sources\MediaSetupUIMgr.dll

      • \$Windows.~WS\Sources\SetupCore.dll

      • \$Windows.~WS\Sources\SetupHost.exe

      • \$Windows.~WS\Sources\SetupMgr.dll

      • \$Windows.~WS\Sources\WinDlp.dll

      • \$Windows.~WS\Sources\setupplatform.dll

      • \$Windows.~WS\Sources\setupplatform.dll

      • \$Windows.~WS\Sources\setupplatform.dll

      • \$Windows.~WS\Sources\unbcl.dll

      • \$Windows.~WS\Sources\unbcl.dll

      • \$Windows.~WS\Sources\unbcl.dll

      • \$Windows.~WS\Sources\wdscore.dll

      • \$Windows.~WS\Sources\wdsutil.dll

      • \$Windows.~WS\Sources\wpx.dll

      • \$Windows.~WS\Sources\wpx.dll

      • \$Windows.~WS\Sources\wpx.dll

      • memory/276-1-0x0000000000000000-mapping.dmp

      • memory/276-46-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

        Filesize

        4KB

      • memory/276-29-0x00000000033C0000-0x00000000033C2000-memory.dmp

        Filesize

        8KB

      • memory/276-19-0x0000000002630000-0x0000000002632000-memory.dmp

        Filesize

        8KB

      • memory/276-36-0x00000000040E0000-0x00000000040F0000-memory.dmp

        Filesize

        64KB

      • memory/276-37-0x0000000000FF0000-0x0000000000FF1000-memory.dmp

        Filesize

        4KB

      • memory/276-44-0x00000000033C0000-0x00000000033C1000-memory.dmp

        Filesize

        4KB

      • memory/300-65-0x0000000000000000-mapping.dmp

      • memory/596-63-0x000000007EF40000-0x000000007EF50000-memory.dmp

        Filesize

        64KB

      • memory/596-52-0x0000000000000000-mapping.dmp

      • memory/1220-40-0x0000000000000000-mapping.dmp

      • memory/1456-74-0x0000000000000000-mapping.dmp

      • memory/1496-66-0x0000000000000000-mapping.dmp

      • memory/1584-73-0x0000000000000000-mapping.dmp

      • memory/1656-51-0x000007FEF6DA0000-0x000007FEF701A000-memory.dmp

        Filesize

        2.5MB

      • memory/2020-75-0x0000000000000000-mapping.dmp