Analysis

  • max time kernel
    146s
  • max time network
    149s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    30-10-2020 20:19

General

  • Target

    fZQDwrtq.exe

  • Size

    4.6MB

  • MD5

    bf8e7e333f16566a67a33205d4d57d54

  • SHA1

    cb4682b463004dac5af531a9396671642de53032

  • SHA256

    f19fdeb545b8d9aa73b3506ffe1867f3da17b240d0e346b38f3ff9f75c7bc66b

  • SHA512

    0b87e756425998231246a1c3da1d4ed6d70898103910357c15ec204428d4c4aa86f7adb8d5a6d4ce1a89a192595735caf754e6fc70e53c1319d10487a2761c1f

Score
6/10

Malware Config

Signatures

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Enumerates processes with tasklist 1 TTPs 1 IoCs
  • Gathers network information 2 TTPs 1 IoCs

    Uses commandline utility to view network configuration.

  • Gathers system information 1 TTPs 1 IoCs

    Runs systeminfo.exe.

  • GoLang User-Agent 15 IoCs

    Uses default user-agent string defined by GoLang HTTP packages.

  • Suspicious use of AdjustPrivilegeToken 379 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fZQDwrtq.exe
    "C:\Users\Admin\AppData\Local\Temp\fZQDwrtq.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4644
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic process GET * /translate:nocomma /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:5104
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic cpu GET * /translate:nocomma /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4116
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic path Win32_TimeZone GET * /translate:nocomma /format:csv
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:4200
    • C:\Windows\SysWOW64\Wbem\wmic.exe
      wmic path Win32_NetworkAdapterConfiguration GET * /translate:nocomma /format:csv
      2⤵
        PID:3020
      • C:\Windows\SysWOW64\systeminfo.exe
        systeminfo /fo csv
        2⤵
        • Gathers system information
        PID:4300
      • C:\Windows\SysWOW64\Wbem\wmic.exe
        wmic service GET * /translate:nocomma /format:csv
        2⤵
          PID:4368
        • C:\Windows\SysWOW64\Wbem\wmic.exe
          wmic logicaldisk GET * /translate:nocomma /format:csv
          2⤵
            PID:636
          • C:\Windows\SysWOW64\Wbem\wmic.exe
            wmic path Win32_PnPEntity GET * /translate:nocomma /format:csv
            2⤵
              PID:1236
            • C:\Windows\SysWOW64\Wbem\wmic.exe
              wmic bios GET * /translate:nocomma /format:csv
              2⤵
                PID:1584
              • C:\Windows\SysWOW64\Wbem\wmic.exe
                wmic os GET * /translate:nocomma /format:csv
                2⤵
                  PID:1964
                • C:\Windows\SysWOW64\ipconfig.exe
                  ipconfig /all
                  2⤵
                  • Gathers network information
                  PID:2856
                • C:\Windows\SysWOW64\tasklist.exe
                  tasklist /fo csv
                  2⤵
                  • Enumerates processes with tasklist
                  PID:3900
                • C:\Windows\SysWOW64\sc.exe
                  sc query type= service state= all
                  2⤵
                    PID:4588

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Execution

                Command-Line Interface

                1
                T1059

                Discovery

                Query Registry

                1
                T1012

                Process Discovery

                1
                T1057

                System Information Discovery

                2
                T1082

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • memory/636-9-0x0000000000000000-mapping.dmp
                • memory/1236-10-0x0000000000000000-mapping.dmp
                • memory/1584-11-0x0000000000000000-mapping.dmp
                • memory/1964-12-0x0000000000000000-mapping.dmp
                • memory/2856-13-0x0000000000000000-mapping.dmp
                • memory/3020-6-0x0000000000000000-mapping.dmp
                • memory/3900-14-0x0000000000000000-mapping.dmp
                • memory/4116-4-0x0000000000000000-mapping.dmp
                • memory/4200-5-0x0000000000000000-mapping.dmp
                • memory/4300-7-0x0000000000000000-mapping.dmp
                • memory/4368-8-0x0000000000000000-mapping.dmp
                • memory/4588-15-0x0000000000000000-mapping.dmp
                • memory/4644-0-0x0000000000400000-0x00000000008AE000-memory.dmp
                  Filesize

                  4.7MB

                • memory/5104-3-0x0000000000000000-mapping.dmp