Analysis
-
max time kernel
66s -
max time network
111s -
platform
windows10_x64 -
resource
win10v20201028 -
submitted
10-11-2020 07:01
Static task
static1
Behavioral task
behavioral1
Sample
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe
Resource
win10v20201028
General
-
Target
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe
-
Size
13.6MB
-
MD5
cef1d2e1d36b6f08bc0c050d15579aa5
-
SHA1
62dcbb5f4af22c46f16931e6a0845e49386af35c
-
SHA256
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854
-
SHA512
4cbbcf55711af28af3804f70e67971f28ef71a38e73db7ea52d26ccf5a271cbc2fe6282741c57112a0e226ee96660b8031b2db947e79fdf99ca581a91b9b49a5
Malware Config
Signatures
-
Processes:
yara_rule upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx upx -
Drops desktop.ini file(s) 1 IoCs
Processes:
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exedescription ioc process File created C:\Program Files\Common Files\microsoft shared\Stationery\Desktop.ini 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe -
Legitimate hosting services abused for malware hosting/C2 1 TTPs
-
Drops autorun.inf file 1 TTPs
Malware can abuse Windows Autorun to spread further via attached volumes.
-
Drops file in Program Files directory 668 IoCs
Processes:
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exedescription ioc process File opened for modification C:\Program Files\7-Zip\Lang\lt.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\uk.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\System\msadc\msadcor.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\IpsPlugin.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\COPYRIGHT 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jabswitch.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\mng.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\System\Ole DB\msdaps.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ClickToRun\AppVIsvApi.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.th-th.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\base_altgr.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Internet Explorer\ieinstal.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\ru.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\System\ado\msado27.tlb 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-join.avi 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\System\ado\adovbs.inc 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\InputPersonalization.exe.mui 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Internet Explorer\SIGNUP\install.ins 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\README.html 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\VC\msdia100.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main\ja-jp.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\main.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\VisualElements\Logo.png 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\chrome.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\co.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\System\Ole DB\msdasqlr.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\System\msadc\msdaprst.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\en-US\boxed-delete.avi 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipscht.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipsplk.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\VisualElements\SmallLogoDev.png 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\chrome_pwa_launcher.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\SetupMetrics\20201028184004.pma 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\7-Zip\Lang\en.ttt.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\C2RINTL.da-dk.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-localization-l1-2-0.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\osknav\osknavbase.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\symbols\ea-sym.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\ipskor.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\VisualElements\LogoBeta.png 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\jmc.ini 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\vccorlib140.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\el.pak 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\VisualElements\LogoDev.png 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\it.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-synch-l1-2-0.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-stdio-l1-1-0.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\hwrusash.dat 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\sl-SI\tipresx.dll.mui 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Java\jdk1.8.0_66\bin\javadoc.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\7-Zip\Lang\da.txt.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\7-Zip\Lang\ga.txt.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-core-timezone-l1-1-0.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Common Files\microsoft shared\ClickToRun\api-ms-win-crt-heap-l1-1-0.dll 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\fr.pak 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\mr.pak 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\notification_helper.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\FlickLearningWizard.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fr-FR\tipresx.dll.mui 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File created C:\Program Files\Common Files\microsoft shared\ink\fsdefinitions\oskmenu.xml 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\chrome.dll.sig 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\et.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\7-Zip\Lang\zh-cn.txt 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe File opened for modification C:\Program Files\Google\Chrome\Application\86.0.4240.111\Locales\pt-PT.pak 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 3176 508 WerFault.exe 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe -
Modifies Internet Explorer start page 1 TTPs 4 IoCs
Processes:
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.smcdjiSBhd.com" 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.ErqehuHmFJ.com" 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.KjOqdymDdJ.com" 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (str) \REGISTRY\USER\S-1-5-21-1985363256-3005190890-1182679451-1000\Software\Microsoft\Internet Explorer\Main\Start Page = "https://www.cZKKNRzeAC.com" 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe -
Processes:
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\D1EB23A46D17D68FD92564C2F1F1601764D8E349\Blob = 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 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Set value (data) \REGISTRY\MACHINE\SOFTWARE\Microsoft\SystemCertificates\AuthRoot\Certificates\DAC9024F54D8F6DF94935FB1732638CA6AD77C13\Blob = 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 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe -
Suspicious use of AdjustPrivilegeToken 2 IoCs
Processes:
96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exedescription pid process Token: SeLockMemoryPrivilege 508 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe Token: SeLockMemoryPrivilege 508 96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe"C:\Users\Admin\AppData\Local\Temp\96d4390298791075aced02dee4a2c702717d568cfc5c296c3d359860fe9c4854.exe"1⤵
- Drops desktop.ini file(s)
- Drops file in Program Files directory
- Modifies Internet Explorer start page
- Modifies system certificate store
- Suspicious use of AdjustPrivilegeToken
PID:508 -
C:\Windows\system32\WerFault.exeC:\Windows\system32\WerFault.exe -u -p 508 -s 16442⤵
- Program crash
PID:3176