Resubmissions

07-11-2020 21:55

201107-hpbkxklwmn 10

07-11-2020 21:28

201107-vkwbkzk1ej 10

Analysis

  • max time kernel
    146s
  • max time network
    137s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    07-11-2020 21:55

General

  • Target

    lsass.exe

  • Size

    214KB

  • MD5

    3a87a3c5abcdc92ef421700ac6f5d0d1

  • SHA1

    70509f9eed0f90f62b804da75aa73b6a3f6390ec

  • SHA256

    45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

  • SHA512

    f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • ServiceHost packer 14 IoCs

    Detects ServiceHost packer used for .NET malware

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Program crash 2 IoCs
  • Checks SCSI registry key(s) 3 TTPs 3 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 848 IoCs
  • Suspicious use of AdjustPrivilegeToken 9 IoCs
  • Suspicious use of FindShellTrayWindow 13 IoCs
  • Suspicious use of SendNotifyMessage 13 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lsass.exe
    "C:\Users\Admin\AppData\Local\Temp\lsass.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:2484
    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
      "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe" -start
      2⤵
      • Executes dropped EXE
      • Enumerates connected drives
      • Suspicious behavior: EnumeratesProcesses
      PID:4052
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 1780
        3⤵
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3916
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 4052 -s 1800
        3⤵
        • Suspicious use of NtCreateProcessExOtherParentProcess
        • Program crash
        • Suspicious use of AdjustPrivilegeToken
        PID:3404
    • C:\Windows\SysWOW64\notepad.exe
      notepad.exe
      2⤵
      • Deletes itself
      PID:3708
  • C:\Windows\System32\rundll32.exe
    C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
    1⤵
      PID:2236
    • C:\Windows\system32\taskmgr.exe
      "C:\Windows\system32\taskmgr.exe" /4
      1⤵
      • Checks SCSI registry key(s)
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      PID:3344

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    2
    T1112

    Install Root Certificate

    1
    T1130

    Discovery

    Query Registry

    2
    T1012

    Peripheral Device Discovery

    2
    T1120

    System Information Discovery

    2
    T1082

    Command and Control

    Web Service

    1
    T1102

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
      MD5

      e5be8c65934ad0c00c584026d085108e

      SHA1

      6ce4c8bc54630bf9f70d3fe93ce91bf44004439f

      SHA256

      68413df5f5923c0283167f5bf10bb7a65b1cdbea7602d263f64af49820efa315

      SHA512

      50470648453a249e3ec06572fd418a123bd0500291a8b3bc0c7cde453ac36e027130f49f01c17ab21034d6033abe1f81402166ee80460b0fcb56856f20db2539

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
      MD5

      3208da0c038576623565b095fcea4ad1

      SHA1

      bc421f8eb4b9c6100aa444edece988c01dd63b26

      SHA256

      16ca708624c0f83871bbb8349e31fba20e5591f298ee91ddf08faf2919041f4b

      SHA512

      17fd810bdb400ce06167d6009a23cbdafdeb5eb0cb5c18456ec3a833546ad050429b003bdec753aa591d5b370cbb1290633abc1cc71f3ae29e81d58c56b8408c

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
      MD5

      3bf227caeee1b07d47b29873a1640f1a

      SHA1

      61af6e587db89d7d7f518bb1e16c2d73451e5ed6

      SHA256

      30becef61dd6dd9d8b0402aec82db12ebb3ef7b76d854ca1f8bd30fa50ab5980

      SHA512

      29a3663efa62ccc6dce4e083b7e43e80560de48ebc0eebfff5aed1fc158f0ed65a009589046773cb3c97588005219f45ae414c53f7bffe5a0a2ec80b0c2a903e

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3F26ED5DE6B4E859CCCA6035ECB8D9CB
      MD5

      65bf6594d95dd6390855b90b1dbe7996

      SHA1

      5ee9ac14e902068de265852e88c599dd5e9018d1

      SHA256

      5a6c3e078b44ec56677cc51be7363932d749263cc96c3a981c2c36e2d373b12d

      SHA512

      7506d63de159db90652bcd3db10900e5cda8bbb4e17f7b2f59e3de809f059142803d8146f3d0bafa26d24e8f1b76552577ceefff567e58a20e3fa1cfc53602a7

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\204C1AA6F6114E6A513754A2AB5760FA_0673414C08DE7F919AE3F6C4CC65AEEE
      MD5

      e9c0b652bef494aa397b601ed0100410

      SHA1

      f9e619404ebe27122d7fa0c7f211994da659096e

      SHA256

      d91da219d0d454dbb67b624adcbc71a5dcccc2f1fc114f8a1af3d03f5edef38a

      SHA512

      d42a80d7d2c0c5756e4c4e06a56a6e795ca268140a51edef915db6f1909bc42ea29a136c3fb8d67d5fc1c1409019acf889e0256d25dbcdfa46e9e014233f50a8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
      MD5

      0e094aa6e4c1942162e5ec20d7c1ee01

      SHA1

      2ef7913cc74540858daddfe437767b1a18e568cb

      SHA256

      22f4cc935e4aca60f79b475531b023069c7341f752e548e3d11bf2c361f4dd9e

      SHA512

      478dcd74baccc60b89f8ff1a49d4d10b65bc62d999261e00ad4ae8401b9972d93d7fcdbfacee5ffb1bed639de597966c20252481b7c29f712a3569f4c6a8dc73

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\RW8YYLAG\QA26QEM1.htm
      MD5

      b1cd7c031debba3a5c77b39b6791c1a7

      SHA1

      e5d91e14e9c685b06f00e550d9e189deb2075f76

      SHA256

      57ba053f075e0b80f747f3102ed985687c16a8754d109e7c4d33633269a36aaa

      SHA512

      d2bbefdc1effb52a38964c4cec5990a5a226248eca36f99e446c0c5704436f666bf1cb514e73b8991411d497d3325ecc646cbd5065c364e92ab6b9c5f1ad4a72

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\IE\UOAPEAJQ\7E8NEBMU.htm
      MD5

      8615e70875c2cc0b9db16027b9adf11d

      SHA1

      4ed62cf405311c0ff562a3c59334a15ddc4f1bf9

      SHA256

      da96949ba6b0567343f144486505c8c8fa1d892fd88c9cbc3ef3d751a570724d

      SHA512

      cd9dfc88dc2af9438b7d6b618d1b62029b3bdf739fc4daa5b37397afd12c4528561b3bf2fc3f3f2adf3fd1f582d5524332441fd30248fcd078e41aa91e17cb73

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
      MD5

      3a87a3c5abcdc92ef421700ac6f5d0d1

      SHA1

      70509f9eed0f90f62b804da75aa73b6a3f6390ec

      SHA256

      45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

      SHA512

      f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

    • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\explorer.exe
      MD5

      3a87a3c5abcdc92ef421700ac6f5d0d1

      SHA1

      70509f9eed0f90f62b804da75aa73b6a3f6390ec

      SHA256

      45dd162163830e078517e6afb39a1b472d5077394500f2b3f85fa3711eb742af

      SHA512

      f6ae90245715e6e0a1e640ab123fa2c47971517142a65ebd4960aefac3493cabd65686cdb99623ce06d586f76b1e12d93e238086e83beed0a6bf649eb2518a6f

    • memory/3404-67-0x00000000058F0000-0x00000000058F1000-memory.dmp
      Filesize

      4KB

    • memory/3404-51-0x0000000004F40000-0x0000000004F41000-memory.dmp
      Filesize

      4KB

    • memory/3404-50-0x0000000004F40000-0x0000000004F41000-memory.dmp
      Filesize

      4KB

    • memory/3708-4-0x0000000000000000-mapping.dmp
    • memory/3708-3-0x0000000000380000-0x0000000000381000-memory.dmp
      Filesize

      4KB

    • memory/3916-28-0x0000000004E60000-0x0000000004E61000-memory.dmp
      Filesize

      4KB

    • memory/3916-13-0x0000000004400000-0x0000000004401000-memory.dmp
      Filesize

      4KB

    • memory/4052-15-0x0000000000000000-mapping.dmp
    • memory/4052-46-0x0000000000000000-mapping.dmp
    • memory/4052-19-0x0000000000000000-mapping.dmp
    • memory/4052-20-0x0000000000000000-mapping.dmp
    • memory/4052-21-0x0000000000000000-mapping.dmp
    • memory/4052-22-0x0000000000000000-mapping.dmp
    • memory/4052-23-0x0000000000000000-mapping.dmp
    • memory/4052-24-0x0000000000000000-mapping.dmp
    • memory/4052-26-0x0000000000000000-mapping.dmp
    • memory/4052-25-0x0000000000000000-mapping.dmp
    • memory/4052-27-0x0000000000000000-mapping.dmp
    • memory/4052-17-0x0000000000000000-mapping.dmp
    • memory/4052-37-0x0000000000000000-mapping.dmp
    • memory/4052-38-0x0000000000000000-mapping.dmp
    • memory/4052-39-0x0000000000000000-mapping.dmp
    • memory/4052-40-0x0000000000000000-mapping.dmp
    • memory/4052-41-0x0000000000000000-mapping.dmp
    • memory/4052-42-0x0000000000000000-mapping.dmp
    • memory/4052-43-0x0000000000000000-mapping.dmp
    • memory/4052-44-0x0000000000000000-mapping.dmp
    • memory/4052-45-0x0000000000000000-mapping.dmp
    • memory/4052-18-0x0000000000000000-mapping.dmp
    • memory/4052-47-0x0000000000000000-mapping.dmp
    • memory/4052-48-0x0000000000000000-mapping.dmp
    • memory/4052-49-0x0000000000000000-mapping.dmp
    • memory/4052-16-0x0000000000000000-mapping.dmp
    • memory/4052-14-0x0000000000000000-mapping.dmp
    • memory/4052-53-0x0000000000000000-mapping.dmp
    • memory/4052-54-0x0000000000000000-mapping.dmp
    • memory/4052-55-0x0000000000000000-mapping.dmp
    • memory/4052-56-0x0000000000000000-mapping.dmp
    • memory/4052-57-0x0000000000000000-mapping.dmp
    • memory/4052-58-0x0000000000000000-mapping.dmp
    • memory/4052-59-0x0000000000000000-mapping.dmp
    • memory/4052-60-0x0000000000000000-mapping.dmp
    • memory/4052-61-0x0000000000000000-mapping.dmp
    • memory/4052-62-0x0000000000000000-mapping.dmp
    • memory/4052-63-0x0000000000000000-mapping.dmp
    • memory/4052-64-0x0000000000000000-mapping.dmp
    • memory/4052-65-0x0000000000000000-mapping.dmp
    • memory/4052-66-0x0000000000000000-mapping.dmp
    • memory/4052-0-0x0000000000000000-mapping.dmp