Analysis

  • max time kernel
    146s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    30-10-2020 20:19

General

  • Target

    fZQDwrtq.exe

  • Size

    4.6MB

  • MD5

    bf8e7e333f16566a67a33205d4d57d54

  • SHA1

    cb4682b463004dac5af531a9396671642de53032

  • SHA256

    f19fdeb545b8d9aa73b3506ffe1867f3da17b240d0e346b38f3ff9f75c7bc66b

  • SHA512

    0b87e756425998231246a1c3da1d4ed6d70898103910357c15ec204428d4c4aa86f7adb8d5a6d4ce1a89a192595735caf754e6fc70e53c1319d10487a2761c1f

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies service 2 TTPs 2 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • GoLang User-Agent 15 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of AdjustPrivilegeToken 361 IoCs
  • Suspicious use of WriteProcessMemory 52 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fZQDwrtq.exe
    "C:\Users\Admin\AppData\Local\Temp\fZQDwrtq.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:288
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic cpu GET * /translate:nocomma /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1184
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic process GET * /translate:nocomma /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1964
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic path Win32_TimeZone GET * /translate:nocomma /format:csv
      2⤵
        PID:1272
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic path Win32_NetworkAdapterConfiguration GET * /translate:nocomma /format:csv
        2⤵
          PID:1704
        • C:\Windows\SysWOW64\systeminfo.exe
          systeminfo /fo csv
          2⤵
          • Gathers system information
          PID:440
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic service GET * /translate:nocomma /format:csv
          2⤵
            PID:1192
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic logicaldisk GET * /translate:nocomma /format:csv
            2⤵
              PID:1460
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic path Win32_PnPEntity GET * /translate:nocomma /format:csv
              2⤵
                PID:1036
              • C:\Windows\SysWOW64\ipconfig.exe
                ipconfig /all
                2⤵
                • Modifies service
                • Gathers network information
                PID:1076
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                wmic bios GET * /translate:nocomma /format:csv
                2⤵
                  PID:1760
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /fo csv
                  2⤵
                  • Enumerates processes with tasklist
                  PID:1068
                • C:\Windows\SysWOW64\Wbem\wmic.exe
                  wmic os GET * /translate:nocomma /format:csv
                  2⤵
                    PID:476
                  • C:\Windows\SysWOW64\sc.exe
                    sc query type= service state= all
                    2⤵
                      PID:1704

                  Network

                  MITRE ATT&CK Matrix ATT&CK v6

                  Execution

                  Command-Line Interface

                  1
                  T1059

                  Persistence

                  Modify Existing Service

                  1
                  T1031

                  Defense Evasion

                  Modify Registry

                  1
                  T1112

                  Discovery

                  Query Registry

                  1
                  T1012

                  Process Discovery

                  1
                  T1057

                  System Information Discovery

                  2
                  T1082

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • memory/288-0-0x0000000000400000-0x00000000008AE000-memory.dmp
                    Filesize

                    4.7MB

                  • memory/440-10-0x0000000000000000-mapping.dmp
                  • memory/476-17-0x0000000000000000-mapping.dmp
                  • memory/1036-13-0x0000000000000000-mapping.dmp
                  • memory/1068-16-0x0000000000000000-mapping.dmp
                  • memory/1076-14-0x0000000000000000-mapping.dmp
                  • memory/1184-6-0x0000000000000000-mapping.dmp
                  • memory/1192-11-0x0000000000000000-mapping.dmp
                  • memory/1272-8-0x0000000000000000-mapping.dmp
                  • memory/1460-12-0x0000000000000000-mapping.dmp
                  • memory/1704-9-0x0000000000000000-mapping.dmp
                  • memory/1704-18-0x0000000000000000-mapping.dmp
                  • memory/1760-15-0x0000000000000000-mapping.dmp
                  • memory/1964-7-0x0000000000000000-mapping.dmp