Analysis

  • max time kernel
    110s
  • max time network
    135s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    08-11-2020 17:40

General

  • Target

    f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653.exe

  • Size

    725KB

  • MD5

    4d3ab2e575b8e2f10d7201677d7e784b

  • SHA1

    8b4edc54158818aa4f92f60b320c52c51600ae25

  • SHA256

    f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653

  • SHA512

    777c224af5045a6df1af2d2fca91b7a193cdd8425661c063f84f7cb7fccf7d030565669d1a452928984b374dfb95746ff5345039f3c4e2554e79431927ab7801

Malware Config

Signatures

  • Deletes Windows Defender Definitions 2 TTPs 1 IoCs

    Uses mpcmdrun utility to delete all AV definitions.

  • Disables Task Manager via registry modification
  • Drops file in Drivers directory 1 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • Modifies file permissions 1 TTPs 1 IoCs
  • Reads user/profile data of local email clients 2 TTPs

    Email clients store some user data on disk where infostealers will often target it.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses 2FA software files, possible credential harvesting 2 TTPs
  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • JavaScript code in executable 1 IoCs
  • Looks up external IP address via web service 4 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Kills process with taskkill 1 IoCs
  • Modifies system certificate store 2 TTPs 10 IoCs
  • Suspicious behavior: EnumeratesProcesses 20 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 38 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653.exe
    "C:\Users\Admin\AppData\Local\Temp\f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:980
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\3051c6ed-6ad9-4c28-a277-20f53e266451" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:2660
    • C:\Users\Admin\AppData\Local\Temp\f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653.exe
      "C:\Users\Admin\AppData\Local\Temp\f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Modifies system certificate store
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:2896
      • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe
        "C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe"
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:3384
        • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe
          "C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe" --Admin
          4⤵
          • Executes dropped EXE
          • Suspicious use of WriteProcessMemory
          PID:1352
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -Command Set-ExecutionPolicy -Scope CurrentUser RemoteSigned
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            PID:3972
          • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
            powershell -NoProfile -ExecutionPolicy Bypass -Command "& {Start-Process PowerShell -ArgumentList '-NoProfile -ExecutionPolicy Bypass -File ""C:\Users\Admin\AppData\Local\script.ps1""' -Verb RunAs}"
            5⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of WriteProcessMemory
            PID:188
            • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
              "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" -NoProfile -ExecutionPolicy Bypass -File "C:\Users\Admin\AppData\Local\script.ps1
              6⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious use of AdjustPrivilegeToken
              PID:1796
          • C:\Program Files\Windows Defender\mpcmdrun.exe
            "C:\Program Files\Windows Defender\mpcmdrun.exe" -removedefinitions -all
            5⤵
            • Deletes Windows Defender Definitions
            PID:3260
          • C:\Windows\SysWOW64\cmd.exe
            C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\delself.bat""
            5⤵
              PID:4060
        • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin2.exe
          "C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin2.exe"
          3⤵
          • Drops file in Drivers directory
          • Executes dropped EXE
          PID:2500
        • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\5.exe
          "C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\5.exe"
          3⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Checks processor information in registry
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of WriteProcessMemory
          PID:2468
          • C:\Windows\SysWOW64\cmd.exe
            "C:\Windows\System32\cmd.exe" /c taskkill /im 5.exe /f & erase C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\5.exe & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:4072
            • C:\Windows\SysWOW64\taskkill.exe
              taskkill /im 5.exe /f
              5⤵
              • Kills process with taskkill
              • Suspicious use of AdjustPrivilegeToken
              PID:3968

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
      MD5

      473b867b22c45299c72e214824158bc8

      SHA1

      dfdce1aa6b4849b662a68d9678e1546e8f609676

      SHA256

      fb8ec9f410db6de1be3547e4ce7b18184a58a8828961e807809f610077db1fe4

      SHA512

      02d0912227b002f8b093d0a9a98a7555a81f57e87aa4d6838e32644425f9273fcfe98984eca354b4d92bd75c668fd3d0b5768fe3fb570b5531146ae3ab9bb5d8

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
      MD5

      b64094c78dd155184fb03d4e7707eaf0

      SHA1

      6dee5a62bc97e211968ef94318f0db174d8721f9

      SHA256

      b1189511c5ff7a62294d0195dcc772cfe7e6152775fb87446f573c5b18ffc8ef

      SHA512

      5d95b65a9f0453f6fdabe0633d994bfd46acb1533528c4b69a53da3b93228535db6e3583ec3fa2079a436e8798cebebc3e520b7791d728a1897a034c1137ef4e

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\5.exe
      MD5

      28994346c82a501f6198643b4c6a1f81

      SHA1

      d6ea2f731626402b0081504628a9ba05f4279cbf

      SHA256

      6b57625c531e64626de7627158f8644f9f4825357ebd01173eb3441fd84cb232

      SHA512

      ce4f1be36ad0730468c09d537f1e639c3f5a6aebaa0c64057b5709e83fe596d072c5e33e405d311efba41b6146581da5008489f2caf13a46778dcf62081c4138

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\5.exe
      MD5

      28994346c82a501f6198643b4c6a1f81

      SHA1

      d6ea2f731626402b0081504628a9ba05f4279cbf

      SHA256

      6b57625c531e64626de7627158f8644f9f4825357ebd01173eb3441fd84cb232

      SHA512

      ce4f1be36ad0730468c09d537f1e639c3f5a6aebaa0c64057b5709e83fe596d072c5e33e405d311efba41b6146581da5008489f2caf13a46778dcf62081c4138

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe
      MD5

      5b4bd24d6240f467bfbc74803c9f15b0

      SHA1

      c17f98c182d299845c54069872e8137645768a1a

      SHA256

      14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

      SHA512

      a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe
      MD5

      5b4bd24d6240f467bfbc74803c9f15b0

      SHA1

      c17f98c182d299845c54069872e8137645768a1a

      SHA256

      14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

      SHA512

      a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin1.exe
      MD5

      5b4bd24d6240f467bfbc74803c9f15b0

      SHA1

      c17f98c182d299845c54069872e8137645768a1a

      SHA256

      14c7bec7369d4175c6d92554b033862b3847ff98a04dfebdf9f5bb30180ed13e

      SHA512

      a896acc38a6ff9641b0803f0598369c0d4fa8e38da28c1653c57948fe5e3274880d1b2e7959cd1b1da43375a1318b3ba72e13240bf40b27c852ee72bbb16cadc

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin2.exe
      MD5

      996ba35165bb62473d2a6743a5200d45

      SHA1

      52169b0b5cce95c6905873b8d12a759c234bd2e0

      SHA256

      5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d

      SHA512

      2a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634

    • C:\Users\Admin\AppData\Local\0d0fca0a-10d2-4e50-b19d-6d5f7a61eea3\updatewin2.exe
      MD5

      996ba35165bb62473d2a6743a5200d45

      SHA1

      52169b0b5cce95c6905873b8d12a759c234bd2e0

      SHA256

      5caffdc76a562e098c471feaede5693f9ead92d5c6c10fb3951dd1fa6c12d21d

      SHA512

      2a7fb9bdf8dcf577ac851752f8875a710a3694b99d107c397942fce1392fd99ee0b85f1fddc18c33fba56d7b8fd4dda5f40f28e64d8398e6048c2ab140780634

    • C:\Users\Admin\AppData\Local\3051c6ed-6ad9-4c28-a277-20f53e266451\f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653.exe
      MD5

      4d3ab2e575b8e2f10d7201677d7e784b

      SHA1

      8b4edc54158818aa4f92f60b320c52c51600ae25

      SHA256

      f90deacedb2274ca6cd60b1699c6ff5aba30b4d3e8a45a1999cde019050fc653

      SHA512

      777c224af5045a6df1af2d2fca91b7a193cdd8425661c063f84f7cb7fccf7d030565669d1a452928984b374dfb95746ff5345039f3c4e2554e79431927ab7801

    • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
      MD5

      13151583954f0def829054cc3eae25ec

      SHA1

      2a2b013e8d4201ddc8a80f9680931873702d0213

      SHA256

      eb542ae9c791940e8e74833eb50543dbbcbc8bf8485698fad82a8b079546c8a7

      SHA512

      3f7a6d0e5ca29de7b02f5cb993c508ce0c0df12c3d970a3ad6da95149b4cb5cc7a138e7ed6f83e910cb39120f199b3f74fc0ec1a14ca86435a52f247c2514aaf

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      9c7c3c99f053750078d0a35c7a1fe567

      SHA1

      011fe9fdfe6458ad99d54bb82b50925055b7dfc3

      SHA256

      cd86aabb43b0753009942e5e5078d18f434d895d9a1f0e8f8b55b03f4bc81c9e

      SHA512

      8d4788e7c4b19cc0c59994a4194d4eaf9129216023ed97ba02f0ab524a2e8c56cbaecd8847bdb544e9040f1aa5b7ededa5bafa935bc3f4536d40e6b244eb8d94

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
      MD5

      ce5a6c903277c22e5c38681906aa0f27

      SHA1

      46abfd49ec7fa9c80cdf9301645509873b95c56c

      SHA256

      4d0b71fc8d2cca1d3d557b6d204335ddb6334f0d8ebef2bce32c91c5bbaf7039

      SHA512

      abf27240a770ccc595eea9f4c818e94bf88ceba84dd872d17ac818dadc55eedacee2535c8a49e32790aab987d61c535f72cf46ce593dff7bada2ab2ff8dd8f24

    • C:\Users\Admin\AppData\Local\Temp\delself.bat
      MD5

      3578b17fe5f4bbff569ddcb3aeb6f7e4

      SHA1

      a95d91434d1a4e76390f38df1da51bb2b666ebcb

      SHA256

      35635a52a9a7eb945bd9712e25a6fed74a78881f7a283360bd5f4c71f346528d

      SHA512

      88bd103e8183ee3e5cbf61fcad209a9945c3eb73c02b2c12ed94a2df82e521bd4db7c4b722f293e354ea56852102e9a7371eadfcb4f715fa08513b5cc4cc847a

    • C:\Users\Admin\AppData\Local\script.ps1
      MD5

      f972c62f986b5ed49ad7713d93bf6c9f

      SHA1

      4e157002bdb97e9526ab97bfafbf7c67e1d1efbf

      SHA256

      b47f85974a7ec2fd5aa82d52f08eb0f6cea7e596a98dd29e8b85b5c37beca0a8

      SHA512

      2c9e2e1b8b6cb5ffe3edf5dfbc2c3b917cd15ba6a5e5264207a43b02ce7020f44f5088aca195f7b428699f0d6bd693ce557a0227d67bbb4795e350a97314e9c4

    • \ProgramData\mozglue.dll
      MD5

      8f73c08a9660691143661bf7332c3c27

      SHA1

      37fa65dd737c50fda710fdbde89e51374d0c204a

      SHA256

      3fe6b1c54b8cf28f571e0c5d6636b4069a8ab00b4f11dd842cfec00691d0c9cd

      SHA512

      0042ecf9b3571bb5eba2de893e8b2371df18f7c5a589f52ee66e4bfbaa15a5b8b7cc6a155792aaa8988528c27196896d5e82e1751c998bacea0d92395f66ad89

    • \ProgramData\nss3.dll
      MD5

      bfac4e3c5908856ba17d41edcd455a51

      SHA1

      8eec7e888767aa9e4cca8ff246eb2aacb9170428

      SHA256

      e2935b5b28550d47dc971f456d6961f20d1633b4892998750140e0eaa9ae9d78

      SHA512

      2565bab776c4d732ffb1f9b415992a4c65b81bcd644a9a1df1333a269e322925fc1df4f76913463296efd7c88ef194c3056de2f1ca1357d7b5fe5ff0da877a66

    • memory/188-43-0x0000000071E00000-0x00000000724EE000-memory.dmp
      Filesize

      6.9MB

    • memory/188-56-0x0000000009610000-0x0000000009611000-memory.dmp
      Filesize

      4KB

    • memory/188-57-0x0000000009C50000-0x0000000009C51000-memory.dmp
      Filesize

      4KB

    • memory/188-41-0x0000000000000000-mapping.dmp
    • memory/980-1-0x0000000002250000-0x0000000002251000-memory.dmp
      Filesize

      4KB

    • memory/1352-16-0x0000000002220000-0x0000000002221000-memory.dmp
      Filesize

      4KB

    • memory/1352-14-0x0000000000000000-mapping.dmp
    • memory/1796-89-0x0000000009D80000-0x0000000009D81000-memory.dmp
      Filesize

      4KB

    • memory/1796-91-0x0000000009D60000-0x0000000009D61000-memory.dmp
      Filesize

      4KB

    • memory/1796-71-0x0000000008890000-0x0000000008891000-memory.dmp
      Filesize

      4KB

    • memory/1796-68-0x0000000008330000-0x0000000008331000-memory.dmp
      Filesize

      4KB

    • memory/1796-61-0x0000000071A50000-0x000000007213E000-memory.dmp
      Filesize

      6.9MB

    • memory/1796-83-0x0000000009C00000-0x0000000009C01000-memory.dmp
      Filesize

      4KB

    • memory/1796-58-0x0000000000000000-mapping.dmp
    • memory/2468-94-0x0000000000000000-mapping.dmp
    • memory/2468-97-0x0000000003286000-0x0000000003287000-memory.dmp
      Filesize

      4KB

    • memory/2468-98-0x0000000004E40000-0x0000000004E41000-memory.dmp
      Filesize

      4KB

    • memory/2500-93-0x000000000051E000-0x000000000051F000-memory.dmp
      Filesize

      4KB

    • memory/2500-85-0x0000000000000000-mapping.dmp
    • memory/2500-88-0x0000000002040000-0x0000000002041000-memory.dmp
      Filesize

      4KB

    • memory/2660-2-0x0000000000000000-mapping.dmp
    • memory/2896-6-0x00000000022C0000-0x00000000022C1000-memory.dmp
      Filesize

      4KB

    • memory/2896-4-0x0000000000000000-mapping.dmp
    • memory/3260-59-0x0000000000000000-mapping.dmp
    • memory/3384-9-0x0000000000000000-mapping.dmp
    • memory/3384-12-0x0000000002210000-0x0000000002211000-memory.dmp
      Filesize

      4KB

    • memory/3384-13-0x000000000048E000-0x000000000048F000-memory.dmp
      Filesize

      4KB

    • memory/3968-102-0x0000000000000000-mapping.dmp
    • memory/3972-18-0x0000000000000000-mapping.dmp
    • memory/3972-26-0x0000000008230000-0x0000000008231000-memory.dmp
      Filesize

      4KB

    • memory/3972-40-0x0000000009D90000-0x0000000009D91000-memory.dmp
      Filesize

      4KB

    • memory/3972-39-0x0000000009DF0000-0x0000000009DF1000-memory.dmp
      Filesize

      4KB

    • memory/3972-38-0x0000000009C90000-0x0000000009C91000-memory.dmp
      Filesize

      4KB

    • memory/3972-37-0x00000000098B0000-0x00000000098B1000-memory.dmp
      Filesize

      4KB

    • memory/3972-30-0x00000000098D0000-0x0000000009903000-memory.dmp
      Filesize

      204KB

    • memory/3972-28-0x0000000008B20000-0x0000000008B21000-memory.dmp
      Filesize

      4KB

    • memory/3972-27-0x0000000008D30000-0x0000000008D31000-memory.dmp
      Filesize

      4KB

    • memory/3972-19-0x0000000071E00000-0x00000000724EE000-memory.dmp
      Filesize

      6.9MB

    • memory/3972-25-0x0000000008430000-0x0000000008431000-memory.dmp
      Filesize

      4KB

    • memory/3972-24-0x00000000083C0000-0x00000000083C1000-memory.dmp
      Filesize

      4KB

    • memory/3972-23-0x0000000008250000-0x0000000008251000-memory.dmp
      Filesize

      4KB

    • memory/3972-22-0x0000000007A80000-0x0000000007A81000-memory.dmp
      Filesize

      4KB

    • memory/3972-21-0x0000000007B40000-0x0000000007B41000-memory.dmp
      Filesize

      4KB

    • memory/3972-20-0x0000000007370000-0x0000000007371000-memory.dmp
      Filesize

      4KB

    • memory/4060-60-0x0000000000000000-mapping.dmp
    • memory/4072-101-0x0000000000000000-mapping.dmp