Analysis
-
max time kernel
150s -
max time network
138s -
platform
windows10_x64 -
resource
win10v200722 -
submitted
12-09-2020 01:31
Static task
static1
Behavioral task
behavioral1
Sample
MediaCreationTool1909.exe
Resource
win7v200722
Behavioral task
behavioral2
Sample
MediaCreationTool1909.exe
Resource
win10v200722
General
-
Target
MediaCreationTool1909.exe
-
Size
18.4MB
-
MD5
d0ba2b1c91124ee4a250c6c53f545f1f
-
SHA1
0352292fc21c8dd442358f2ff4fa8eded01b7dca
-
SHA256
8237794f0fffb298040ed59045b679579fa6e1b66703ec2bf5353e71499c663e
-
SHA512
99d45e22f36f15777e789e54d6a5410a335bd344d009d863afd3c35ce53a6f4811b7e40f912b6da35725e121fff11e51a3fb9659a45a2f7701afc9ab407d7399
Malware Config
Signatures
-
Executes dropped EXE 2 IoCs
Processes:
SetupHost.ExeDiagTrackRunner.exepid process 2700 SetupHost.Exe 2184 DiagTrackRunner.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
SetupHost.Exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-1400429095-533421673-2598934218-1000\Control Panel\International\Geo\Nation SetupHost.Exe -
Loads dropped DLL 17 IoCs
Processes:
SetupHost.ExeDiagTrackRunner.exepid process 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2184 DiagTrackRunner.exe -
JavaScript code in executable 4 IoCs
Processes:
resource yara_rule C:\$Windows.~WS\Sources\SetupPlatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js \$Windows.~WS\Sources\setupplatform.dll js -
Drops file in Windows directory 5 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exedescription ioc process File opened for modification C:\Windows\Logs\MoSetup\BlueBox.log MediaCreationTool1909.exe File opened for modification C:\Windows\setupact.log SetupHost.Exe File opened for modification C:\Windows\setuperr.log SetupHost.Exe File opened for modification C:\Windows\diagerr.xml SetupHost.Exe File opened for modification C:\Windows\diagwrn.xml SetupHost.Exe -
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
DiagTrackRunner.exeSetupHost.Exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz DiagTrackRunner.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 SetupHost.Exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString SetupHost.Exe Key opened \Registry\Machine\HARDWARE\DESCRIPTION\System\CentralProcessor\0 DiagTrackRunner.exe -
NTFS ADS 1 IoCs
Processes:
SetupHost.Exedescription ioc process File created C:\ProgramData\Microsoft\Diagnosis\ETLLogs\DlTel-Merge.etl:$ETLUNIQUECVDATA SetupHost.Exe -
Suspicious behavior: EnumeratesProcesses 4 IoCs
Processes:
SetupHost.Exepid process 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe 2700 SetupHost.Exe -
Suspicious use of AdjustPrivilegeToken 14 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.ExeDiagTrackRunner.exedescription pid process Token: SeBackupPrivilege 3948 MediaCreationTool1909.exe Token: SeRestorePrivilege 3948 MediaCreationTool1909.exe Token: SeBackupPrivilege 3948 MediaCreationTool1909.exe Token: SeRestorePrivilege 3948 MediaCreationTool1909.exe Token: SeBackupPrivilege 2700 SetupHost.Exe Token: SeRestorePrivilege 2700 SetupHost.Exe Token: SeBackupPrivilege 2700 SetupHost.Exe Token: SeRestorePrivilege 2700 SetupHost.Exe Token: SeRestorePrivilege 2700 SetupHost.Exe Token: SeBackupPrivilege 2700 SetupHost.Exe Token: SeDebugPrivilege 2184 DiagTrackRunner.exe Token: SeDebugPrivilege 2184 DiagTrackRunner.exe Token: SeDebugPrivilege 2184 DiagTrackRunner.exe Token: SeDebugPrivilege 2184 DiagTrackRunner.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exepid process 3948 MediaCreationTool1909.exe 2700 SetupHost.Exe -
Suspicious use of WriteProcessMemory 6 IoCs
Processes:
MediaCreationTool1909.exeSetupHost.Exedescription pid process target process PID 3948 wrote to memory of 2700 3948 MediaCreationTool1909.exe SetupHost.Exe PID 3948 wrote to memory of 2700 3948 MediaCreationTool1909.exe SetupHost.Exe PID 3948 wrote to memory of 2700 3948 MediaCreationTool1909.exe SetupHost.Exe PID 2700 wrote to memory of 2184 2700 SetupHost.Exe DiagTrackRunner.exe PID 2700 wrote to memory of 2184 2700 SetupHost.Exe DiagTrackRunner.exe PID 2700 wrote to memory of 2184 2700 SetupHost.Exe DiagTrackRunner.exe -
System policy modification 1 TTPs 1 IoCs
Processes:
DiagTrackRunner.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\DataCollection DiagTrackRunner.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"C:\Users\Admin\AppData\Local\Temp\MediaCreationTool1909.exe"1⤵
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3948 -
C:\$Windows.~WS\Sources\SetupHost.Exe"C:\$Windows.~WS\Sources\SetupHost.Exe" /Download /Web2⤵
- Executes dropped EXE
- Checks computer location settings
- Loads dropped DLL
- Drops file in Windows directory
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\$Windows.~WS\Sources\DiagTrackRunner.exeC:\$Windows.~WS\Sources\DiagTrackRunner.exe /UploadEtlFilesOnly3⤵
- Executes dropped EXE
- Loads dropped DLL
- Checks processor information in registry
- Suspicious use of AdjustPrivilegeToken
- System policy modification
PID:2184
-
-
-
C:\Windows\System32\vdsldr.exeC:\Windows\System32\vdsldr.exe -Embedding1⤵PID:1712