Analysis

  • max time kernel
    148s
  • max time network
    148s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    17-11-2020 12:02

General

  • Target

    6bf5762fcefef0fde8ad24028d3c4c3c.exe

  • Size

    11.3MB

  • MD5

    b8627712608289241fbe66b7aa044b79

  • SHA1

    dd1ce2be81f75c51aa989d99932114ee7dd8b0a1

  • SHA256

    02d0008536e64f889feea39fe3097574ad443ca27cf5314a11feb42059ca3b8a

  • SHA512

    efa150c2dd14034c803c352dff265cd0106393bce55bf5f321d519f1f7ed3b3d9299e713590f174d9b715261af593ff753e7f5b1f61f29299eff1b5425a2d931

Score
9/10

Malware Config

Signatures

  • ServiceHost packer 113 IoCs

    Detects ServiceHost packer used for .NET malware

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 4 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Drops file in Program Files directory 11 IoCs
  • Program crash 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 169 IoCs
  • Suspicious use of AdjustPrivilegeToken 13 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6bf5762fcefef0fde8ad24028d3c4c3c.exe
    "C:\Users\Admin\AppData\Local\Temp\6bf5762fcefef0fde8ad24028d3c4c3c.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:756
    • C:\Users\Admin\AppData\Local\Temp\is-7P42J.tmp\6bf5762fcefef0fde8ad24028d3c4c3c.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-7P42J.tmp\6bf5762fcefef0fde8ad24028d3c4c3c.tmp" /SL5="$301E6,11163886,1063936,C:\Users\Admin\AppData\Local\Temp\6bf5762fcefef0fde8ad24028d3c4c3c.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:416
      • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe
        "C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe" /Q:A /R:N
        3⤵
        • Executes dropped EXE
        PID:2844
      • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe
        "C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe" 6bf5762fcefef0fde8ad24028d3c4c3c.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious behavior: EnumeratesProcesses
        PID:3828
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 840
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:1940
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 872
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:2312
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 876
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:908
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 840
          4⤵
          • Program crash
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          PID:4012
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 832
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:2716
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 864
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:2464
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 828
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:2280
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 872
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:2308
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 840
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:2348
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 872
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:1768
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 800
          4⤵
          • Program crash
          • Suspicious use of AdjustPrivilegeToken
          PID:2848
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 3828 -s 856
          4⤵
          • Program crash
          PID:3788

Network

MITRE ATT&CK Matrix ATT&CK v6

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe
    MD5

    380c2541c28ed9ebbe02ef1de6ba89ec

    SHA1

    7a71555e6e46b1f15d19c2f95c215d2e79457a0a

    SHA256

    240b336311b521adf0087298187521f7221d7fbb879bb42670620ccdfc977ac4

    SHA512

    6550d6be1dd513ccb3010bc7d67ec7599cddc9f3764137161c8bc3f5ee19d3b60e7eda37170eaef5f39166fd03f03a43163156d65eb9776ac721fed0389049eb

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\SVideoBurner.exe
    MD5

    380c2541c28ed9ebbe02ef1de6ba89ec

    SHA1

    7a71555e6e46b1f15d19c2f95c215d2e79457a0a

    SHA256

    240b336311b521adf0087298187521f7221d7fbb879bb42670620ccdfc977ac4

    SHA512

    6550d6be1dd513ccb3010bc7d67ec7599cddc9f3764137161c8bc3f5ee19d3b60e7eda37170eaef5f39166fd03f03a43163156d65eb9776ac721fed0389049eb

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe
    MD5

    f59090e9a8070d7fbbdcc8895d2169a3

    SHA1

    370e62290cac6a6c7aa13442741caf6671437a54

    SHA256

    a6b53074cb4a3f9885f6e7d52c9e893b44cf4965000d899b2bf21508ac320023

    SHA512

    45b9d9bd43b67c39b35a0f4007a2800847e65da8f818bef4b2f5858d95235fca34708ab9b774324bc7e1eb9519ce5d2f4634034f7987c17e788d017f2fdf7d5a

  • C:\Program Files (x86)\S-Mobile Uploader\BurnerService\wmfdist.exe
    MD5

    f59090e9a8070d7fbbdcc8895d2169a3

    SHA1

    370e62290cac6a6c7aa13442741caf6671437a54

    SHA256

    a6b53074cb4a3f9885f6e7d52c9e893b44cf4965000d899b2bf21508ac320023

    SHA512

    45b9d9bd43b67c39b35a0f4007a2800847e65da8f818bef4b2f5858d95235fca34708ab9b774324bc7e1eb9519ce5d2f4634034f7987c17e788d017f2fdf7d5a

  • C:\Users\Admin\AppData\Local\Temp\is-7P42J.tmp\6bf5762fcefef0fde8ad24028d3c4c3c.tmp
    MD5

    d6b0aed2e5177bdc167c88c1218610c5

    SHA1

    58e721a364f61a6d414153369a413f4754c87f5a

    SHA256

    8dc6052267c0bbef0d2d6134326f2f31f4da13314111e817dd32e0db782e5068

    SHA512

    f038ad6ee535c417e9327e564febdeeab41a980c70b963960b08af8196afaf2d553c77a4093e4f9a5c9803ec29888aa827f9487ba8aff37d90de9fc271d75b1e

  • C:\Users\Admin\AppData\Local\Temp\is-7P42J.tmp\6bf5762fcefef0fde8ad24028d3c4c3c.tmp
    MD5

    d6b0aed2e5177bdc167c88c1218610c5

    SHA1

    58e721a364f61a6d414153369a413f4754c87f5a

    SHA256

    8dc6052267c0bbef0d2d6134326f2f31f4da13314111e817dd32e0db782e5068

    SHA512

    f038ad6ee535c417e9327e564febdeeab41a980c70b963960b08af8196afaf2d553c77a4093e4f9a5c9803ec29888aa827f9487ba8aff37d90de9fc271d75b1e

  • \Program Files (x86)\S-Mobile Uploader\BurnerService\sqlite3.dll
    MD5

    e477a96c8f2b18d6b5c27bde49c990bf

    SHA1

    e980c9bf41330d1e5bd04556db4646a0210f7409

    SHA256

    16574f51785b0e2fc29c2c61477eb47bb39f714829999511dc8952b43ab17660

    SHA512

    335a86268e7c0e568b1c30981ec644e6cd332e66f96d2551b58a82515316693c1859d87b4f4b7310cf1ac386cee671580fdd999c3bcb23acf2c2282c01c8798c

  • \Users\Admin\AppData\Local\Temp\is-L6Q8Q.tmp\_isetup\_iscrypt.dll
    MD5

    a69559718ab506675e907fe49deb71e9

    SHA1

    bc8f404ffdb1960b50c12ff9413c893b56f2e36f

    SHA256

    2f6294f9aa09f59a574b5dcd33be54e16b39377984f3d5658cda44950fa0f8fc

    SHA512

    e52e0aa7fe3f79e36330c455d944653d449ba05b2f9abee0914a0910c3452cfa679a40441f9ac696b3ccf9445cbb85095747e86153402fc362bb30ac08249a63

  • \Users\Admin\AppData\Local\Temp\is-L6Q8Q.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • \Users\Admin\AppData\Local\Temp\is-L6Q8Q.tmp\_isetup\_isdecmp.dll
    MD5

    77d6d961f71a8c558513bed6fd0ad6f1

    SHA1

    122bb9ed6704b72250e4e31b5d5fc2f0476c4b6a

    SHA256

    5da7c8d33d3b7db46277012d92875c0b850c8abf1eb3c8c9c5b9532089a0bcf0

    SHA512

    b0921e2442b4cdec8cc479ba3751a01c0646a4804e2f4a5d5632fa2dbf54cc45d4cccffa4d5b522d42afc2f6a622e07882ed7e663c8462333b082e82503f335a

  • memory/416-0-0x0000000000000000-mapping.dmp
  • memory/908-118-0x0000000004D20000-0x0000000004D21000-memory.dmp
    Filesize

    4KB

  • memory/908-112-0x00000000041B0000-0x00000000041B1000-memory.dmp
    Filesize

    4KB

  • memory/1768-200-0x0000000004110000-0x0000000004111000-memory.dmp
    Filesize

    4KB

  • memory/1768-208-0x0000000004B80000-0x0000000004B81000-memory.dmp
    Filesize

    4KB

  • memory/1940-23-0x0000000004C30000-0x0000000004C31000-memory.dmp
    Filesize

    4KB

  • memory/1940-15-0x00000000040C0000-0x00000000040C1000-memory.dmp
    Filesize

    4KB

  • memory/2280-163-0x0000000004E50000-0x0000000004E51000-memory.dmp
    Filesize

    4KB

  • memory/2280-157-0x00000000042E0000-0x00000000042E1000-memory.dmp
    Filesize

    4KB

  • memory/2308-176-0x00000000052E0000-0x00000000052E1000-memory.dmp
    Filesize

    4KB

  • memory/2308-168-0x0000000004960000-0x0000000004961000-memory.dmp
    Filesize

    4KB

  • memory/2312-100-0x00000000047D0000-0x00000000047D1000-memory.dmp
    Filesize

    4KB

  • memory/2312-106-0x0000000005340000-0x0000000005341000-memory.dmp
    Filesize

    4KB

  • memory/2348-183-0x0000000004220000-0x0000000004221000-memory.dmp
    Filesize

    4KB

  • memory/2348-192-0x0000000004BA0000-0x0000000004BA1000-memory.dmp
    Filesize

    4KB

  • memory/2464-152-0x00000000055D0000-0x00000000055D1000-memory.dmp
    Filesize

    4KB

  • memory/2464-146-0x0000000004A60000-0x0000000004A61000-memory.dmp
    Filesize

    4KB

  • memory/2716-141-0x0000000005530000-0x0000000005531000-memory.dmp
    Filesize

    4KB

  • memory/2716-135-0x0000000004AC0000-0x0000000004AC1000-memory.dmp
    Filesize

    4KB

  • memory/2844-6-0x0000000000000000-mapping.dmp
  • memory/2848-223-0x00000000056E0000-0x00000000056E1000-memory.dmp
    Filesize

    4KB

  • memory/2848-215-0x0000000004B70000-0x0000000004B71000-memory.dmp
    Filesize

    4KB

  • memory/3788-230-0x0000000004740000-0x0000000004741000-memory.dmp
    Filesize

    4KB

  • memory/3828-153-0x0000000000000000-mapping.dmp
  • memory/3828-169-0x0000000000000000-mapping.dmp
  • memory/3828-107-0x0000000000000000-mapping.dmp
  • memory/3828-110-0x0000000000000000-mapping.dmp
  • memory/3828-111-0x0000000000000000-mapping.dmp
  • memory/3828-108-0x0000000000000000-mapping.dmp
  • memory/3828-114-0x0000000000000000-mapping.dmp
  • memory/3828-113-0x0000000000000000-mapping.dmp
  • memory/3828-116-0x0000000000000000-mapping.dmp
  • memory/3828-117-0x0000000000000000-mapping.dmp
  • memory/3828-115-0x0000000000000000-mapping.dmp
  • memory/3828-103-0x0000000000000000-mapping.dmp
  • memory/3828-119-0x0000000000000000-mapping.dmp
  • memory/3828-120-0x0000000000000000-mapping.dmp
  • memory/3828-121-0x0000000000000000-mapping.dmp
  • memory/3828-122-0x0000000000000000-mapping.dmp
  • memory/3828-232-0x0000000000000000-mapping.dmp
  • memory/3828-125-0x0000000000000000-mapping.dmp
  • memory/3828-127-0x0000000000000000-mapping.dmp
  • memory/3828-126-0x0000000000000000-mapping.dmp
  • memory/3828-128-0x0000000000000000-mapping.dmp
  • memory/3828-124-0x0000000000000000-mapping.dmp
  • memory/3828-231-0x0000000000000000-mapping.dmp
  • memory/3828-130-0x0000000000000000-mapping.dmp
  • memory/3828-131-0x0000000000000000-mapping.dmp
  • memory/3828-133-0x0000000000000000-mapping.dmp
  • memory/3828-134-0x0000000000000000-mapping.dmp
  • memory/3828-132-0x0000000000000000-mapping.dmp
  • memory/3828-105-0x0000000000000000-mapping.dmp
  • memory/3828-137-0x0000000000000000-mapping.dmp
  • memory/3828-136-0x0000000000000000-mapping.dmp
  • memory/3828-138-0x0000000000000000-mapping.dmp
  • memory/3828-139-0x0000000000000000-mapping.dmp
  • memory/3828-140-0x0000000000000000-mapping.dmp
  • memory/3828-104-0x0000000000000000-mapping.dmp
  • memory/3828-142-0x0000000000000000-mapping.dmp
  • memory/3828-144-0x0000000000000000-mapping.dmp
  • memory/3828-145-0x0000000000000000-mapping.dmp
  • memory/3828-143-0x0000000000000000-mapping.dmp
  • memory/3828-102-0x0000000000000000-mapping.dmp
  • memory/3828-147-0x0000000000000000-mapping.dmp
  • memory/3828-148-0x0000000000000000-mapping.dmp
  • memory/3828-149-0x0000000000000000-mapping.dmp
  • memory/3828-151-0x0000000000000000-mapping.dmp
  • memory/3828-150-0x0000000000000000-mapping.dmp
  • memory/3828-101-0x0000000000000000-mapping.dmp
  • memory/3828-96-0x0000000000000000-mapping.dmp
  • memory/3828-154-0x0000000000000000-mapping.dmp
  • memory/3828-155-0x0000000000000000-mapping.dmp
  • memory/3828-156-0x0000000000000000-mapping.dmp
  • memory/3828-97-0x0000000000000000-mapping.dmp
  • memory/3828-159-0x0000000000000000-mapping.dmp
  • memory/3828-158-0x0000000000000000-mapping.dmp
  • memory/3828-161-0x0000000000000000-mapping.dmp
  • memory/3828-160-0x0000000000000000-mapping.dmp
  • memory/3828-162-0x0000000000000000-mapping.dmp
  • memory/3828-99-0x0000000000000000-mapping.dmp
  • memory/3828-164-0x0000000000000000-mapping.dmp
  • memory/3828-166-0x0000000000000000-mapping.dmp
  • memory/3828-165-0x0000000000000000-mapping.dmp
  • memory/3828-167-0x0000000000000000-mapping.dmp
  • memory/3828-98-0x0000000000000000-mapping.dmp
  • memory/3828-170-0x0000000000000000-mapping.dmp
  • memory/3828-109-0x0000000000000000-mapping.dmp
  • memory/3828-171-0x0000000000000000-mapping.dmp
  • memory/3828-172-0x0000000000000000-mapping.dmp
  • memory/3828-173-0x0000000000000000-mapping.dmp
  • memory/3828-175-0x0000000000000000-mapping.dmp
  • memory/3828-174-0x0000000000000000-mapping.dmp
  • memory/3828-21-0x0000000000000000-mapping.dmp
  • memory/3828-178-0x0000000000000000-mapping.dmp
  • memory/3828-177-0x0000000000000000-mapping.dmp
  • memory/3828-180-0x0000000000000000-mapping.dmp
  • memory/3828-179-0x0000000000000000-mapping.dmp
  • memory/3828-182-0x0000000000000000-mapping.dmp
  • memory/3828-181-0x0000000000000000-mapping.dmp
  • memory/3828-20-0x0000000000000000-mapping.dmp
  • memory/3828-184-0x0000000000000000-mapping.dmp
  • memory/3828-185-0x0000000000000000-mapping.dmp
  • memory/3828-187-0x0000000000000000-mapping.dmp
  • memory/3828-186-0x0000000000000000-mapping.dmp
  • memory/3828-190-0x0000000000000000-mapping.dmp
  • memory/3828-189-0x0000000000000000-mapping.dmp
  • memory/3828-191-0x0000000000000000-mapping.dmp
  • memory/3828-188-0x0000000000000000-mapping.dmp
  • memory/3828-19-0x0000000000000000-mapping.dmp
  • memory/3828-193-0x0000000000000000-mapping.dmp
  • memory/3828-194-0x0000000000000000-mapping.dmp
  • memory/3828-195-0x0000000000000000-mapping.dmp
  • memory/3828-196-0x0000000000000000-mapping.dmp
  • memory/3828-198-0x0000000000000000-mapping.dmp
  • memory/3828-199-0x0000000000000000-mapping.dmp
  • memory/3828-197-0x0000000000000000-mapping.dmp
  • memory/3828-18-0x0000000000000000-mapping.dmp
  • memory/3828-201-0x0000000000000000-mapping.dmp
  • memory/3828-202-0x0000000000000000-mapping.dmp
  • memory/3828-203-0x0000000000000000-mapping.dmp
  • memory/3828-204-0x0000000000000000-mapping.dmp
  • memory/3828-205-0x0000000000000000-mapping.dmp
  • memory/3828-206-0x0000000000000000-mapping.dmp
  • memory/3828-207-0x0000000000000000-mapping.dmp
  • memory/3828-17-0x0000000000000000-mapping.dmp
  • memory/3828-209-0x0000000000000000-mapping.dmp
  • memory/3828-210-0x0000000000000000-mapping.dmp
  • memory/3828-211-0x0000000000000000-mapping.dmp
  • memory/3828-212-0x0000000000000000-mapping.dmp
  • memory/3828-213-0x0000000000000000-mapping.dmp
  • memory/3828-214-0x0000000000000000-mapping.dmp
  • memory/3828-13-0x0000000004740000-0x0000000004741000-memory.dmp
    Filesize

    4KB

  • memory/3828-217-0x0000000000000000-mapping.dmp
  • memory/3828-218-0x0000000000000000-mapping.dmp
  • memory/3828-216-0x0000000000000000-mapping.dmp
  • memory/3828-219-0x0000000000000000-mapping.dmp
  • memory/3828-220-0x0000000000000000-mapping.dmp
  • memory/3828-221-0x0000000000000000-mapping.dmp
  • memory/3828-222-0x0000000000000000-mapping.dmp
  • memory/3828-14-0x0000000004F40000-0x0000000004F41000-memory.dmp
    Filesize

    4KB

  • memory/3828-224-0x0000000000000000-mapping.dmp
  • memory/3828-225-0x0000000000000000-mapping.dmp
  • memory/3828-226-0x0000000000000000-mapping.dmp
  • memory/3828-227-0x0000000000000000-mapping.dmp
  • memory/3828-228-0x0000000000000000-mapping.dmp
  • memory/3828-229-0x0000000000000000-mapping.dmp
  • memory/3828-9-0x0000000000000000-mapping.dmp
  • memory/4012-129-0x00000000055F0000-0x00000000055F1000-memory.dmp
    Filesize

    4KB

  • memory/4012-123-0x0000000004B80000-0x0000000004B81000-memory.dmp
    Filesize

    4KB