Resubmissions

18-03-2021 22:02

210318-wg14eesjje 10

13-11-2020 10:22

201113-ycmfkdqrdn 10

Analysis

  • max time kernel
    93s
  • max time network
    134s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    13-11-2020 10:22

General

  • Target

    be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll

  • Size

    136KB

  • MD5

    fe590fd117449bce4bfad57d36bfc099

  • SHA1

    a5c3d7738ebc1f1ce8353e135b8dcea17155077b

  • SHA256

    be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2

  • SHA512

    f8e39f1e83dd666fff67161864c75057a0f6b4ad1692f0013f0aef47d69ed350662f0784555a72fcdb34bb5937371c7d75010639d5ae31c32d7383ee10a6605b

Score
8/10

Malware Config

Signatures

  • Blacklisted process makes network request 1 IoCs
  • Modifies Internet Explorer settings 1 TTPs 28 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious behavior: MapViewOfSection 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 22 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:2868
      • C:\Windows\system32\rundll32.exe
        rundll32.exe C:\Users\Admin\AppData\Local\Temp\be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll,#1
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:640
        • C:\Windows\SysWOW64\rundll32.exe
          rundll32.exe C:\Users\Admin\AppData\Local\Temp\be294b6faca17e762d1722ea1e447a3ad3a57b4c110cfe8ff515e3d2047c5ad2.dll,#1
          3⤵
          • Blacklisted process makes network request
          • Suspicious behavior: MapViewOfSection
          • Suspicious use of WriteProcessMemory
          PID:996
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c start /min forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1836
        • C:\Windows\system32\forfiles.exe
          forfiles /c "cmd /k @path -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit" /p C:\Windows\system32 /s /m po*l.e*e
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1864
          • C:\Windows\system32\cmd.exe
            /k "C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe" -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA & exit
            4⤵
            • Suspicious use of WriteProcessMemory
            PID:2052
            • C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe
              C:\Windows\system32\WindowsPowerShell\v1.0\powershell.exe -ec aQBlAHgAIAAoAGcAcAAgACcASABLAEMAVQA6AFwAUwBvAGYAdAB3AGEAcgBlAFwATgBlAHQAaQBkACcAKQAuAFQA
              5⤵
              • Suspicious behavior: EnumeratesProcesses
              • Suspicious behavior: MapViewOfSection
              • Suspicious use of AdjustPrivilegeToken
              • Suspicious use of WriteProcessMemory
              PID:2128
              • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.cmdline"
                6⤵
                • Suspicious use of WriteProcessMemory
                PID:4012
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                  C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6429.tmp" "c:\Users\Admin\AppData\Local\Temp\15pcfqs2\CSCDAEE5FC6489A4EFC9D6F70A4B78334CA.TMP"
                  7⤵
                    PID:2304
                • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
                  "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.cmdline"
                  6⤵
                  • Suspicious use of WriteProcessMemory
                  PID:2808
                  • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
                    C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES6543.tmp" "c:\Users\Admin\AppData\Local\Temp\eak03o5o\CSC8F5B777C759A49EBAA7949676E152E2F.TMP"
                    7⤵
                      PID:3856
        • C:\Program Files\Internet Explorer\iexplore.exe
          "C:\Program Files\Internet Explorer\iexplore.exe" -Embedding
          1⤵
          • Modifies Internet Explorer settings
          • Suspicious use of FindShellTrayWindow
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1492
          • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
            "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1492 CREDAT:82945 /prefetch:2
            2⤵
            • Modifies Internet Explorer settings
            • Suspicious use of SetWindowsHookEx
            PID:3456

        Network

        MITRE ATT&CK Matrix ATT&CK v6

        Defense Evasion

        Modify Registry

        1
        T1112

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
          MD5

          a69fba04d9b13e82fb772d1b38b6054a

          SHA1

          f7ab8c1d32ddc58e13f65f9b8bb0cc844f164454

          SHA256

          733d04f9d9e1fdf85914f097cca3f8bfb3926c38a7ccf69e7c74d887abbc64ff

          SHA512

          6fae50c73cc08c48d5ecb6814785f82c46ded1dc00ba9a8b02a9b2bd907a10bba6015e0a5753487a12765db242162ce4f822bf5d3381a71ae2143c9f5d34669a

        • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E49827401028F7A0F97B5576C77A26CB_7CE95D8DCA26FE957E7BD7D76F353B08
          MD5

          02ce44e6486d7afe7ffe62ba86aca760

          SHA1

          2fa384f71eb138a8470254e4eac8f3a44b388845

          SHA256

          dabc99ca73513f7b2e26a24ba0170393028d9e1ab7fb0baa6e48c10739914c10

          SHA512

          abafeff3eaf0bebfe18b9d476660351c80f485b5f7c0aec7bdf44fdefbd639035d997992e0526cab76bdcc43b5bd76cdf07c1bd4d7defebbb297ddd9e2d58026

        • C:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.dll
          MD5

          c4bb3a721ce675a9e9fcb6896574055d

          SHA1

          6172a7ee1cc34c8b43ca0ee93fb70c99c3d6d099

          SHA256

          8da8d28e071c6977c1d27ad42a887ec927c8486efdbcd33991f6c92ffdcb58b2

          SHA512

          fb24c2123a8dade2694a5f18995a82a7a7896a38d4d4562d04e5ec931f0a99acac658f4a08002f70c57f876af9c4c12026dd345782fb8995d058ed0e3725f896

        • C:\Users\Admin\AppData\Local\Temp\RES6429.tmp
          MD5

          003a47f5f773cff04c7f1afd033ab0d0

          SHA1

          2bbcfdc0d8c9b36d9a70fa3a265f7a41aaf674fb

          SHA256

          72d44ce7560a6e92527c33f479bfc3d72bc8678dac03973be017861d01eae9b8

          SHA512

          979839fd96bf48ef344b5c5bda4306e2f42642c05c96a048d5b25de5ac265826b8c500c0b9371484b185cc388a70248c540c2fdd7f7acbf08795954689c15085

        • C:\Users\Admin\AppData\Local\Temp\RES6543.tmp
          MD5

          22294636ae434bc1e2f45ea225e1ac43

          SHA1

          f7025354a53c970d2586f0e36d9ed5f43dc20fea

          SHA256

          726202f42874376d42f4faff01e12ffc8f29a8e5316c6b0e2c71d93af02454e6

          SHA512

          741ce2917689adb73cda7e8b3ec739427afb393d8cffd998d17384856695dfbb8ec12de72900820a7ce2d848517e9fa9abfffb1327bc4b85f408e908c0730ccb

        • C:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.dll
          MD5

          5b49d4c23b8732625271589f3104a62b

          SHA1

          a67867766df269d2ac9dd81e29f7d269f0bfbf0a

          SHA256

          712efd2b55c9586b287c1dfa0bf0a97ad63b8f5302c196138c8bff2796c7fc5a

          SHA512

          db47062eb31ac3913bc15a6572d61229c629ceaeeec33afb17c869ad622e004e5f65923f7f3b17d77c9e709d74715359de2139a97048bdbbb17e2fa6917a6326

        • \??\c:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.0.cs
          MD5

          aee5ecef6b6a9b4372991443276b71ce

          SHA1

          911bd26fba4c5e51423f2c6339cc267f8697f339

          SHA256

          90e03a7c9cb196fd260c54663a4c867f33621ac29746cd8c0a4b2aa9b390754a

          SHA512

          cf99d4941aa5d1a4dd3abd5ca7a4d3d19a7f497c3247fd09505e263a9a4646b81eb19d7a9312b17a00d22ca9881b6d725b76013b7dc470dcc964b77970c96cc3

        • \??\c:\Users\Admin\AppData\Local\Temp\15pcfqs2\15pcfqs2.cmdline
          MD5

          6f0c0054664514e62e8ea4c186ce81f5

          SHA1

          0a2443e0e28511f267d5db426dd6a271b2505f8d

          SHA256

          02dc55d832a9371fa6e80bc955a7c41e5a0a74e87232397b0cfef536277766ac

          SHA512

          d1cb12ab217f8bc0095c9d131c7fae93d16a5ae685e3cc5ec4a4866b9bfb413aa9be6fc10a1931823353b79ae6c44cd796ea7418ef0bdfd328e0d060da15845f

        • \??\c:\Users\Admin\AppData\Local\Temp\15pcfqs2\CSCDAEE5FC6489A4EFC9D6F70A4B78334CA.TMP
          MD5

          816cd2d058e61861e20ed5302e89e6ab

          SHA1

          007554efaace08f697e59d6c6340df24c7cd1aa9

          SHA256

          fee25bcbc5444cb7b91f08f8a8fedcdc425f85d89084386333dcf6a9acc398d2

          SHA512

          f74185f7dee991145366ff9835ca1847734fe8f4c704a68ec73204b17c264ee9e53b9a321c983f9f24c49112c5498caf712b65db7ba8a759dd65ec48ff2a96ac

        • \??\c:\Users\Admin\AppData\Local\Temp\eak03o5o\CSC8F5B777C759A49EBAA7949676E152E2F.TMP
          MD5

          ad98ca2bcf33cb3ae42b9ac3d0ebe532

          SHA1

          75df7853188b5d3eba6e62d858c7908657087ff0

          SHA256

          0c84f88fce765101bccecc6ea3ad8ae27fd5a53ae6708a8bcc0c7eb28065b6df

          SHA512

          940a238073de5a4d916de0eafc20a2e933e780d4f808ca541889fd4ec77f37173802f24d8ca5543665e8cff553b41ab4cbca665568e9ddb79723eda055cd48a0

        • \??\c:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.0.cs
          MD5

          a5043957e07dbe0dee7bb8aad13a403e

          SHA1

          571c9136e0e90d016dd83b24c40eadbf7186c701

          SHA256

          73775570d08cc971668d853274b7c9a0cfb407cf76480747b9e38542e5dc53c9

          SHA512

          14f98e4902059980ed8f46c72fdefeb404f14df0fa06628476d63f9bb9ed76fd6398abd4de8c1de7dfa2a8b2108c31e2b9b668acfc92958c1eecc4a0c8d656a1

        • \??\c:\Users\Admin\AppData\Local\Temp\eak03o5o\eak03o5o.cmdline
          MD5

          f06989497413c5987e8de8ad6ffd43ab

          SHA1

          110ad454dae9931f667740c4284279edf3cd749d

          SHA256

          b582c4369c983b7b329326f80f352200177d69965b6792b6af808d3ae06ac9b0

          SHA512

          827113bcaf445f8fea380577869929bdec887994957b3a3d11ee35f7387e7c45fdce5f167f068440f768f2addecb46c2567846993ee62b1a4950f93ed6cc271c

        • memory/996-30-0x0000000004310000-0x0000000004328000-memory.dmp
          Filesize

          96KB

        • memory/996-1-0x0000000004720000-0x0000000004732000-memory.dmp
          Filesize

          72KB

        • memory/996-0-0x0000000000000000-mapping.dmp
        • memory/1864-5-0x0000000000000000-mapping.dmp
        • memory/1864-6-0x0000000000000000-mapping.dmp
        • memory/2052-7-0x0000000000000000-mapping.dmp
        • memory/2128-9-0x00007FF9E63D0000-0x00007FF9E6DBC000-memory.dmp
          Filesize

          9.9MB

        • memory/2128-19-0x000002711B390000-0x000002711B391000-memory.dmp
          Filesize

          4KB

        • memory/2128-8-0x0000000000000000-mapping.dmp
        • memory/2128-10-0x000002711B340000-0x000002711B341000-memory.dmp
          Filesize

          4KB

        • memory/2128-27-0x000002711B3A0000-0x000002711B3A1000-memory.dmp
          Filesize

          4KB

        • memory/2128-28-0x0000027136020000-0x0000027136038000-memory.dmp
          Filesize

          96KB

        • memory/2128-11-0x0000027136080000-0x0000027136081000-memory.dmp
          Filesize

          4KB

        • memory/2304-15-0x0000000000000000-mapping.dmp
        • memory/2808-20-0x0000000000000000-mapping.dmp
        • memory/3456-2-0x0000000000000000-mapping.dmp
        • memory/3856-23-0x0000000000000000-mapping.dmp
        • memory/4012-12-0x0000000000000000-mapping.dmp