Analysis
-
max time kernel
151s -
max time network
149s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
09-11-2020 21:17
Static task
static1
Behavioral task
behavioral1
Sample
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe
Resource
win10v20201028
General
-
Target
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe
-
Size
266KB
-
MD5
607f3249f01bcb2406e81c2cce900f73
-
SHA1
ee08e9662d34fa613e43ef7d9c81b393377abded
-
SHA256
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958
-
SHA512
f46ce677320f2de9b0fce39733484485c14274d3a6e391e68a23ce3aa2273d1bd2871f028293b69ce4319afed73efa251d26483ad5522066624fca75208fca0d
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 1940 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exepid process 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exemsdcsc.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Set value (str) \REGISTRY\USER\S-1-5-21-293278959-2699126792-324916226-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Users\\Admin\\Documents\\MSDCSC\\msdcsc.exe" msdcsc.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeSecurityPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeTakeOwnershipPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeLoadDriverPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeSystemProfilePrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeSystemtimePrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeProfSingleProcessPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeIncBasePriorityPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeCreatePagefilePrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeBackupPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeRestorePrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeShutdownPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeDebugPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeSystemEnvironmentPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeChangeNotifyPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeRemoteShutdownPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeUndockPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeManageVolumePrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeImpersonatePrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeCreateGlobalPrivilege 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: 33 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: 34 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: 35 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe Token: SeIncreaseQuotaPrivilege 1940 msdcsc.exe Token: SeSecurityPrivilege 1940 msdcsc.exe Token: SeTakeOwnershipPrivilege 1940 msdcsc.exe Token: SeLoadDriverPrivilege 1940 msdcsc.exe Token: SeSystemProfilePrivilege 1940 msdcsc.exe Token: SeSystemtimePrivilege 1940 msdcsc.exe Token: SeProfSingleProcessPrivilege 1940 msdcsc.exe Token: SeIncBasePriorityPrivilege 1940 msdcsc.exe Token: SeCreatePagefilePrivilege 1940 msdcsc.exe Token: SeBackupPrivilege 1940 msdcsc.exe Token: SeRestorePrivilege 1940 msdcsc.exe Token: SeShutdownPrivilege 1940 msdcsc.exe Token: SeDebugPrivilege 1940 msdcsc.exe Token: SeSystemEnvironmentPrivilege 1940 msdcsc.exe Token: SeChangeNotifyPrivilege 1940 msdcsc.exe Token: SeRemoteShutdownPrivilege 1940 msdcsc.exe Token: SeUndockPrivilege 1940 msdcsc.exe Token: SeManageVolumePrivilege 1940 msdcsc.exe Token: SeImpersonatePrivilege 1940 msdcsc.exe Token: SeCreateGlobalPrivilege 1940 msdcsc.exe Token: 33 1940 msdcsc.exe Token: 34 1940 msdcsc.exe Token: 35 1940 msdcsc.exe -
Suspicious use of WriteProcessMemory 35 IoCs
Processes:
98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.execmd.exemsdcsc.exedescription pid process target process PID 844 wrote to memory of 1220 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe cmd.exe PID 844 wrote to memory of 1220 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe cmd.exe PID 844 wrote to memory of 1220 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe cmd.exe PID 844 wrote to memory of 1220 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe cmd.exe PID 1220 wrote to memory of 1860 1220 cmd.exe attrib.exe PID 1220 wrote to memory of 1860 1220 cmd.exe attrib.exe PID 1220 wrote to memory of 1860 1220 cmd.exe attrib.exe PID 1220 wrote to memory of 1860 1220 cmd.exe attrib.exe PID 844 wrote to memory of 1940 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe msdcsc.exe PID 844 wrote to memory of 1940 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe msdcsc.exe PID 844 wrote to memory of 1940 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe msdcsc.exe PID 844 wrote to memory of 1940 844 98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe msdcsc.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe PID 1940 wrote to memory of 1676 1940 msdcsc.exe notepad.exe -
Views/modifies file attributes 1 TTPs 1 IoCs
Processes
-
C:\Users\Admin\AppData\Local\Temp\98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe"C:\Users\Admin\AppData\Local\Temp\98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:844 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:1220 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\98755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958.exe" +s +h3⤵
- Views/modifies file attributes
PID:1860 -
C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"C:\Users\Admin\Documents\MSDCSC\msdcsc.exe"2⤵
- Executes dropped EXE
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:1676
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
607f3249f01bcb2406e81c2cce900f73
SHA1ee08e9662d34fa613e43ef7d9c81b393377abded
SHA25698755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958
SHA512f46ce677320f2de9b0fce39733484485c14274d3a6e391e68a23ce3aa2273d1bd2871f028293b69ce4319afed73efa251d26483ad5522066624fca75208fca0d
-
MD5
607f3249f01bcb2406e81c2cce900f73
SHA1ee08e9662d34fa613e43ef7d9c81b393377abded
SHA25698755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958
SHA512f46ce677320f2de9b0fce39733484485c14274d3a6e391e68a23ce3aa2273d1bd2871f028293b69ce4319afed73efa251d26483ad5522066624fca75208fca0d
-
MD5
607f3249f01bcb2406e81c2cce900f73
SHA1ee08e9662d34fa613e43ef7d9c81b393377abded
SHA25698755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958
SHA512f46ce677320f2de9b0fce39733484485c14274d3a6e391e68a23ce3aa2273d1bd2871f028293b69ce4319afed73efa251d26483ad5522066624fca75208fca0d
-
MD5
607f3249f01bcb2406e81c2cce900f73
SHA1ee08e9662d34fa613e43ef7d9c81b393377abded
SHA25698755eadea7bd0b44fc437ec5bb15f3aaedcf5cb3265e59e579c23dd29086958
SHA512f46ce677320f2de9b0fce39733484485c14274d3a6e391e68a23ce3aa2273d1bd2871f028293b69ce4319afed73efa251d26483ad5522066624fca75208fca0d