Analysis

  • max time kernel
    140s
  • max time network
    141s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-11-2020 11:21

General

  • Target

    a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521.exe

  • Size

    725KB

  • MD5

    001841a84c6055b44bbafb3be385c8f6

  • SHA1

    1336143f18b91007601b488a281470e3e031af04

  • SHA256

    a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521

  • SHA512

    c511aa90553d6297da0d273534137f3700e099062087cde29eb1cbed4922604bb6f97b0d4507688fa35145302bd6514e4676c6cb4d2ed3d3a162e8b0fd3d62c7

Malware Config

Signatures

  • Modifies file permissions 1 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 1 IoCs
  • Looks up external IP address via web service 3 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of WriteProcessMemory 8 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521.exe
    "C:\Users\Admin\AppData\Local\Temp\a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521.exe"
    1⤵
    • Adds Run key to start application
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of WriteProcessMemory
    PID:1040
    • C:\Windows\SysWOW64\icacls.exe
      icacls "C:\Users\Admin\AppData\Local\2ec243b1-d410-4ace-8abf-c3ef5f21b179" /deny *S-1-1-0:(OI)(CI)(DE,DC)
      2⤵
      • Modifies file permissions
      PID:932
    • C:\Users\Admin\AppData\Local\Temp\a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521.exe
      "C:\Users\Admin\AppData\Local\Temp\a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521.exe" --Admin IsNotAutoStart IsNotTask
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      PID:112

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

File Permissions Modification

1
T1222

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    43e21cc196f1fd47ffee7b29181a10cf

    SHA1

    ced1279d35e00e24ea474886742c58e09f4a2afd

    SHA256

    521861f255cb528838ab040a1fcb6f8e65b76a0c0c097ad1375aa88bb0d05b1f

    SHA512

    d5e5354af44ad98d82bbf9241b5983934e7c35554503ec107b4930561ee33682ca829ca17fb9de4a529daa6dbba40a8d7f1e99a8f821a7bd443851c46cb2418b

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    aec6c18112fa208f532f4fc9e6949955

    SHA1

    373b24fa08ad3458cbb12b5ae3f21c754e0ca67f

    SHA256

    304eefb4e7571e8daa120cf229e457fa071f01a74bddb01d439e69bea0d2c843

    SHA512

    338785b76fba178c05a59f3ef7778279450a40249fe99c27694e9e60ab82b8fff19b5dfcbf0e32687f89878ca248daf645b029a36259a653a17275c28f3862be

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\07CEF2F654E3ED6050FFC9B6EB844250_3431D4C539FB2CFCB781821E9902850D
    MD5

    6a90a047e960d08b17b11f46b0708bdd

    SHA1

    49d0fed66a9520c9c657b585dfde454e612805e9

    SHA256

    08ede1710f4c9915436776e7950b27e673ea071554ffca421d04ee91f9af6782

    SHA512

    3188620fbd5d20a9782273fd163737a852bcd2d117eac746bf2ffdae791733d28d8af19b728348629dba1c195a04bcd38a4ddf17cf89280ed8bd3b2addb0ddb2

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    a24d07b6dfdab240fadb49fad9dfe3b3

    SHA1

    64ae1b5e338ee0eeb445e30cd713a545e2f9cfde

    SHA256

    faf6287c3162fae222c6efbbbee5a3a9bb2793f0843bc69ec3cb73401925e666

    SHA512

    03222ea16e329795e3da75ab8745d88aaad5107449cc4219917c76324fd30121a57317e3bb2295fdd1f462366169020b795b7cd711fd9d8dabaeb951783c1971

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B2FAF7692FD9FFBD64EDE317E42334BA_D7393C8F62BDE4D4CB606228BC7A711E
    MD5

    2df51966bf5a204fee184cd06f316c34

    SHA1

    34c8eae624c30301018534d78f31d1fc9a1896c1

    SHA256

    7d9151346f3ea48db999f4b77ca31129930e6b38ec56d58455bf24ed2f0f0c53

    SHA512

    d9303bf5a4bf5cd6be5afaea762636182b8486747f43412638ffbf2f8165c15c59a523d1d3b6a46de3f45078833cf4c7978fcd7ac46099f27635a4f388e6db15

  • C:\Users\Admin\AppData\Local\2ec243b1-d410-4ace-8abf-c3ef5f21b179\a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521.exe
    MD5

    001841a84c6055b44bbafb3be385c8f6

    SHA1

    1336143f18b91007601b488a281470e3e031af04

    SHA256

    a3c074948f5e3d2b89f0035bbf7bd74b1a3ec0525dc1496b4463f55ef15f3521

    SHA512

    c511aa90553d6297da0d273534137f3700e099062087cde29eb1cbed4922604bb6f97b0d4507688fa35145302bd6514e4676c6cb4d2ed3d3a162e8b0fd3d62c7

  • memory/112-7-0x0000000000340000-0x00000000003D1000-memory.dmp
    Filesize

    580KB

  • memory/112-8-0x0000000002000000-0x0000000002011000-memory.dmp
    Filesize

    68KB

  • memory/112-5-0x0000000000000000-mapping.dmp
  • memory/932-3-0x0000000000000000-mapping.dmp
  • memory/1040-0-0x0000000000570000-0x0000000000601000-memory.dmp
    Filesize

    580KB

  • memory/1040-1-0x0000000002060000-0x0000000002071000-memory.dmp
    Filesize

    68KB

  • memory/1516-2-0x000007FEF6550000-0x000007FEF67CA000-memory.dmp
    Filesize

    2.5MB