Analysis

  • max time kernel
    148s
  • max time network
    142s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-11-2020 11:43

General

  • Target

    7d9b6189d0c08e7db2a76ba2f06b48ed.exe

  • Size

    11.1MB

  • MD5

    f07df9299a787c554608c0f0ca62f71c

  • SHA1

    de3026deabaa110c8ba796bea99213323cf1a041

  • SHA256

    cc1dc40bedf0589bfe144beeee1b65c6f9ec1522169d4d5b3af2c297918bb469

  • SHA512

    b4acf94f9de4bbd9c5c06ac1c96ca117d3d74427089eadbbd876e932bcd1159ddb066bb6ef2504c8fb539d2fb92b55ef29b3246232a1e29daf08a1ee2ed42024

Score
9/10

Malware Config

Signatures

  • ServiceHost packer 87 IoCs

    Detects ServiceHost packer used for .NET malware

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 11 IoCs
  • Program crash 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 117 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7d9b6189d0c08e7db2a76ba2f06b48ed.exe
    "C:\Users\Admin\AppData\Local\Temp\7d9b6189d0c08e7db2a76ba2f06b48ed.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2268
    • C:\Users\Admin\AppData\Local\Temp\is-FIBHS.tmp\7d9b6189d0c08e7db2a76ba2f06b48ed.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-FIBHS.tmp\7d9b6189d0c08e7db2a76ba2f06b48ed.tmp" /SL5="$60030,10873714,790016,C:\Users\Admin\AppData\Local\Temp\7d9b6189d0c08e7db2a76ba2f06b48ed.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1888
      • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe
        "C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe" /Q:A /R:N
        3⤵
        • Executes dropped EXE
        PID:3268
      • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe
        "C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe" 7d9b6189d0c08e7db2a76ba2f06b48ed.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:748
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 844
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3952
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 848
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1388
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 836
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3588
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 816
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2124
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 820
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:3884
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 864
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:3432
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 916
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:500
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 748 -s 904
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:3908

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe
    MD5

    1581bd96e4e04e67e2e7e514e786e533

    SHA1

    ba6e2c9ce161cd5a50426c0db29b7ca23174cdba

    SHA256

    aec503198fdb76af0ddf12f645a98c8aa4c5de8c7f8271f6543baf67796277ff

    SHA512

    d4f2a29c8ec275c4cfa40c5ebd7a80fa51c7a162c6086e02030481aab596bba3a0d45e5abe7cf88a6174f222a8d1d5bee7e6695881af23dc3671ef2c1b25db72

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe
    MD5

    1581bd96e4e04e67e2e7e514e786e533

    SHA1

    ba6e2c9ce161cd5a50426c0db29b7ca23174cdba

    SHA256

    aec503198fdb76af0ddf12f645a98c8aa4c5de8c7f8271f6543baf67796277ff

    SHA512

    d4f2a29c8ec275c4cfa40c5ebd7a80fa51c7a162c6086e02030481aab596bba3a0d45e5abe7cf88a6174f222a8d1d5bee7e6695881af23dc3671ef2c1b25db72

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe
    MD5

    f59090e9a8070d7fbbdcc8895d2169a3

    SHA1

    370e62290cac6a6c7aa13442741caf6671437a54

    SHA256

    a6b53074cb4a3f9885f6e7d52c9e893b44cf4965000d899b2bf21508ac320023

    SHA512

    45b9d9bd43b67c39b35a0f4007a2800847e65da8f818bef4b2f5858d95235fca34708ab9b774324bc7e1eb9519ce5d2f4634034f7987c17e788d017f2fdf7d5a

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe
    MD5

    f59090e9a8070d7fbbdcc8895d2169a3

    SHA1

    370e62290cac6a6c7aa13442741caf6671437a54

    SHA256

    a6b53074cb4a3f9885f6e7d52c9e893b44cf4965000d899b2bf21508ac320023

    SHA512

    45b9d9bd43b67c39b35a0f4007a2800847e65da8f818bef4b2f5858d95235fca34708ab9b774324bc7e1eb9519ce5d2f4634034f7987c17e788d017f2fdf7d5a

  • C:\Users\Admin\AppData\Local\Temp\is-FIBHS.tmp\7d9b6189d0c08e7db2a76ba2f06b48ed.tmp
    MD5

    bd5ba940935c395768d98cc2911a321c

    SHA1

    0ba748ce837d78527d920a5dac66c7600f97af71

    SHA256

    9acfdb224158ea8f006c5e7a249ee97e27da848ad45e11d425947183fa86131b

    SHA512

    17c96dda1f64beda671357831ff6d4f5354b66fb484943c0929ecec9f752de404a973f1e598dbc2739567f808283bd8189552ff597fc45d7df71c28e18e10c9b

  • C:\Users\Admin\AppData\Local\Temp\is-FIBHS.tmp\7d9b6189d0c08e7db2a76ba2f06b48ed.tmp
    MD5

    bd5ba940935c395768d98cc2911a321c

    SHA1

    0ba748ce837d78527d920a5dac66c7600f97af71

    SHA256

    9acfdb224158ea8f006c5e7a249ee97e27da848ad45e11d425947183fa86131b

    SHA512

    17c96dda1f64beda671357831ff6d4f5354b66fb484943c0929ecec9f752de404a973f1e598dbc2739567f808283bd8189552ff597fc45d7df71c28e18e10c9b

  • \Program Files (x86)\S-Mobile Uploader\BurnerService\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • \Users\Admin\AppData\Local\Temp\is-NHT46.tmp\_isetup\_iscrypt.dll
    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • \Users\Admin\AppData\Local\Temp\is-NHT46.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • \Users\Admin\AppData\Local\Temp\is-NHT46.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • memory/500-95-0x0000000004150000-0x0000000004151000-memory.dmp
    Filesize

    4KB

  • memory/500-104-0x0000000004B80000-0x0000000004B81000-memory.dmp
    Filesize

    4KB

  • memory/748-63-0x0000000000000000-mapping.dmp
  • memory/748-117-0x0000000000000000-mapping.dmp
  • memory/748-193-0x0000000000000000-mapping.dmp
  • memory/748-13-0x0000000004700000-0x0000000004701000-memory.dmp
    Filesize

    4KB

  • memory/748-18-0x0000000000000000-mapping.dmp
  • memory/748-17-0x0000000000000000-mapping.dmp
  • memory/748-19-0x0000000000000000-mapping.dmp
  • memory/748-21-0x0000000000000000-mapping.dmp
  • memory/748-20-0x0000000000000000-mapping.dmp
  • memory/748-192-0x0000000000000000-mapping.dmp
  • memory/748-23-0x0000000000000000-mapping.dmp
  • memory/748-24-0x0000000000000000-mapping.dmp
  • memory/748-25-0x0000000000000000-mapping.dmp
  • memory/748-26-0x0000000000000000-mapping.dmp
  • memory/748-120-0x0000000000000000-mapping.dmp
  • memory/748-28-0x0000000000000000-mapping.dmp
  • memory/748-70-0x0000000000000000-mapping.dmp
  • memory/748-30-0x0000000000000000-mapping.dmp
  • memory/748-32-0x0000000000000000-mapping.dmp
  • memory/748-31-0x0000000000000000-mapping.dmp
  • memory/748-119-0x0000000000000000-mapping.dmp
  • memory/748-34-0x0000000000000000-mapping.dmp
  • memory/748-35-0x0000000000000000-mapping.dmp
  • memory/748-36-0x0000000000000000-mapping.dmp
  • memory/748-37-0x0000000000000000-mapping.dmp
  • memory/748-39-0x0000000000000000-mapping.dmp
  • memory/748-72-0x0000000000000000-mapping.dmp
  • memory/748-41-0x0000000000000000-mapping.dmp
  • memory/748-42-0x0000000000000000-mapping.dmp
  • memory/748-43-0x0000000000000000-mapping.dmp
  • memory/748-118-0x0000000000000000-mapping.dmp
  • memory/748-45-0x0000000000000000-mapping.dmp
  • memory/748-46-0x0000000000000000-mapping.dmp
  • memory/748-47-0x0000000000000000-mapping.dmp
  • memory/748-48-0x0000000000000000-mapping.dmp
  • memory/748-71-0x0000000000000000-mapping.dmp
  • memory/748-50-0x0000000000000000-mapping.dmp
  • memory/748-51-0x0000000000000000-mapping.dmp
  • memory/748-52-0x0000000000000000-mapping.dmp
  • memory/748-53-0x0000000000000000-mapping.dmp
  • memory/748-54-0x0000000000000000-mapping.dmp
  • memory/748-55-0x0000000000000000-mapping.dmp
  • memory/748-56-0x0000000000000000-mapping.dmp
  • memory/748-116-0x0000000000000000-mapping.dmp
  • memory/748-60-0x0000000000000000-mapping.dmp
  • memory/748-14-0x0000000004F00000-0x0000000004F01000-memory.dmp
    Filesize

    4KB

  • memory/748-62-0x0000000000000000-mapping.dmp
  • memory/748-61-0x0000000000000000-mapping.dmp
  • memory/748-65-0x0000000000000000-mapping.dmp
  • memory/748-64-0x0000000000000000-mapping.dmp
  • memory/748-115-0x0000000000000000-mapping.dmp
  • memory/748-69-0x0000000000000000-mapping.dmp
  • memory/748-29-0x0000000000000000-mapping.dmp
  • memory/748-114-0x0000000000000000-mapping.dmp
  • memory/748-40-0x0000000000000000-mapping.dmp
  • memory/748-73-0x0000000000000000-mapping.dmp
  • memory/748-68-0x0000000000000000-mapping.dmp
  • memory/748-113-0x0000000000000000-mapping.dmp
  • memory/748-75-0x0000000000000000-mapping.dmp
  • memory/748-76-0x0000000000000000-mapping.dmp
  • memory/748-78-0x0000000000000000-mapping.dmp
  • memory/748-77-0x0000000000000000-mapping.dmp
  • memory/748-79-0x0000000000000000-mapping.dmp
  • memory/748-109-0x0000000000000000-mapping.dmp
  • memory/748-81-0x0000000000000000-mapping.dmp
  • memory/748-82-0x0000000000000000-mapping.dmp
  • memory/748-84-0x0000000000000000-mapping.dmp
  • memory/748-83-0x0000000000000000-mapping.dmp
  • memory/748-86-0x0000000000000000-mapping.dmp
  • memory/748-87-0x0000000000000000-mapping.dmp
  • memory/748-85-0x0000000000000000-mapping.dmp
  • memory/748-111-0x0000000000000000-mapping.dmp
  • memory/748-89-0x0000000000000000-mapping.dmp
  • memory/748-90-0x0000000000000000-mapping.dmp
  • memory/748-92-0x0000000000000000-mapping.dmp
  • memory/748-93-0x0000000000000000-mapping.dmp
  • memory/748-94-0x0000000000000000-mapping.dmp
  • memory/748-91-0x0000000000000000-mapping.dmp
  • memory/748-9-0x0000000000000000-mapping.dmp
  • memory/748-97-0x0000000000000000-mapping.dmp
  • memory/748-96-0x0000000000000000-mapping.dmp
  • memory/748-98-0x0000000000000000-mapping.dmp
  • memory/748-99-0x0000000000000000-mapping.dmp
  • memory/748-100-0x0000000000000000-mapping.dmp
  • memory/748-101-0x0000000000000000-mapping.dmp
  • memory/748-102-0x0000000000000000-mapping.dmp
  • memory/748-103-0x0000000000000000-mapping.dmp
  • memory/748-110-0x0000000000000000-mapping.dmp
  • memory/748-105-0x0000000000000000-mapping.dmp
  • memory/748-107-0x0000000000000000-mapping.dmp
  • memory/748-106-0x0000000000000000-mapping.dmp
  • memory/748-108-0x0000000000000000-mapping.dmp
  • memory/1388-27-0x0000000004260000-0x0000000004261000-memory.dmp
    Filesize

    4KB

  • memory/1388-33-0x0000000004C90000-0x0000000004C91000-memory.dmp
    Filesize

    4KB

  • memory/1888-0-0x0000000000000000-mapping.dmp
  • memory/2124-49-0x0000000004230000-0x0000000004231000-memory.dmp
    Filesize

    4KB

  • memory/2124-57-0x0000000004D60000-0x0000000004D61000-memory.dmp
    Filesize

    4KB

  • memory/3268-6-0x0000000000000000-mapping.dmp
  • memory/3432-88-0x0000000005920000-0x0000000005921000-memory.dmp
    Filesize

    4KB

  • memory/3432-80-0x0000000004DF0000-0x0000000004DF1000-memory.dmp
    Filesize

    4KB

  • memory/3588-44-0x00000000058A0000-0x00000000058A1000-memory.dmp
    Filesize

    4KB

  • memory/3884-67-0x0000000004F70000-0x0000000004F71000-memory.dmp
    Filesize

    4KB

  • memory/3884-74-0x0000000005AA0000-0x0000000005AA1000-memory.dmp
    Filesize

    4KB

  • memory/3908-112-0x0000000004810000-0x0000000004811000-memory.dmp
    Filesize

    4KB

  • memory/3952-22-0x00000000057A0000-0x00000000057A1000-memory.dmp
    Filesize

    4KB

  • memory/3952-15-0x0000000004D70000-0x0000000004D71000-memory.dmp
    Filesize

    4KB