Resubmissions

12-11-2021 18:04

211112-wnzb8aahhm 10

19-11-2020 10:08

201119-rhwlt38jrx 10

18-11-2020 17:26

201118-htd4fq29va 10

Analysis

  • max time kernel
    1804s
  • max time network
    1581s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    18-11-2020 17:26

General

  • Target

    SecurityTaskManager_Setup.exe

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Drops file in Windows directory 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 27 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecurityTaskManager_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\SecurityTaskManager_Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4688
    • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\setup.exe
      ".\setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:724
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" "C:\Program Files (x86)\Security Task Manager\taskman.exe"
        3⤵
          PID:3540
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:4396
      • C:\Program Files (x86)\Security Task Manager\TaskMan.exe
        "C:\Program Files (x86)\Security Task Manager\TaskMan.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Drops file in Program Files directory
        • Drops file in Windows directory
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:4392
        • C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe
          "C:\Program Files\Common Files\Microsoft Shared\ClickToRun\OfficeClickToRun.exe" scenario=install scenariosubtype=ARP sourcetype=None productstoremove=ProPlusRetail.16_en-us_x-none culture=en-us version.16=16.0
          3⤵
          • Checks processor information in registry
          • Enumerates system info in registry
          • Suspicious use of SetWindowsHookEx
          PID:4608
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:684
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2352
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:4028
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3796
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
        PID:2480
      • C:\Windows\SysWOW64\DllHost.exe
        C:\Windows\SysWOW64\DllHost.exe /Processid:{448AEE3B-DC65-4AF6-BF5F-DCE86D62B6C7}
        1⤵
          PID:4396

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Program Files (x86)\Security Task Manager\TaskMan.exe

        • C:\Program Files (x86)\Security Task Manager\TaskMan.exe

        • C:\Program Files (x86)\Security Task Manager\ascode.dll

        • C:\Program Files (x86)\Security Task Manager\lgs_bulgarian.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_czech.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_danish.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_deutsch.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_dutch.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_english.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_finnish.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_french.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_hungarian.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_italiano.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_japanese.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_korean.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_norwegian_bokmaal.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_polish.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_portuguese (Brasil).txt

        • C:\Program Files (x86)\Security Task Manager\lgs_portuguese.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_russian.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_spanish.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_swedish.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_turkish.txt

        • C:\Program Files (x86)\Security Task Manager\lgs_ukrainian.txt

        • C:\Program Files (x86)\Security Task Manager\sqlite3.dll

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\Formulaire.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\LisezMoi.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\Setup.exe

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SpyProDll.dll

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\SpyProtector.exe

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\ascode.dll

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\bestell.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\file_id.diz

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\leggimi.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_bulgarian.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_czech.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_danish.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_deutsch.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_dutch.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_english.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_finnish.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_french.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_hungarian.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_italiano.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_japanese.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_korean.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_norwegian_bokmaal.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_polish.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_portuguese (Brasil).txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_portuguese.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_russian.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_spanish.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_swedish.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_turkish.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\lgs_ukrainian.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\liesmich.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\manual_de.pdf

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\manual_en.pdf

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\manual_fr.pdf

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\order.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\ordina.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\psapi_.dll

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\readme.txt

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\setup.exe

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\sqlite3.dll

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\taskman.exe

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\taskman_de.chm

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\taskman_en.chm

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\taskman_fr.chm

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\taskman_ru.chm

        • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\uninstal.exe

        • C:\Users\Public\Desktop\Security Task Manager.lnk

        • \Program Files (x86)\Security Task Manager\ascode.dll

        • \Program Files (x86)\Security Task Manager\ascode.dll

        • \Program Files (x86)\Security Task Manager\sqlite3.dll

        • memory/724-0-0x0000000000000000-mapping.dmp

        • memory/3540-47-0x0000000000000000-mapping.dmp

        • memory/4392-210-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-316-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-205-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-206-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-207-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-208-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-209-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-203-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-211-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-212-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-213-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-214-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-215-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-216-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-217-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-218-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-219-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-220-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-221-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-222-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-223-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-224-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-225-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-226-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-227-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-228-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-229-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-230-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-231-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-254-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-301-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-302-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-303-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-304-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-305-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-306-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-308-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-307-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-309-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-310-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-311-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-312-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-313-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-314-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-315-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-204-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-317-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-318-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-319-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-320-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-321-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-323-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-392-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-202-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-201-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-199-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-200-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-198-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-197-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-196-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-195-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-194-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-193-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-191-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-192-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-189-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-190-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-187-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-188-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-186-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-185-0x0000000006470000-0x0000000006471000-memory.dmp

          Filesize

          4KB

        • memory/4392-121-0x0000000005B70000-0x0000000005B71000-memory.dmp

          Filesize

          4KB

        • memory/4392-57-0x00000000046A0000-0x00000000046A1000-memory.dmp

          Filesize

          4KB

        • memory/4392-49-0x0000000000000000-mapping.dmp

        • memory/4392-620-0x0000000007A70000-0x0000000007A80000-memory.dmp

          Filesize

          64KB

        • memory/4392-624-0x0000000007A70000-0x0000000007A80000-memory.dmp

          Filesize

          64KB

        • memory/4392-632-0x0000000007A70000-0x0000000007A80000-memory.dmp

          Filesize

          64KB

        • memory/4392-742-0x0000000007CC0000-0x0000000007DCA000-memory.dmp

          Filesize

          1.0MB

        • memory/4392-711-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

          Filesize

          40KB

        • memory/4392-713-0x0000000007CC0000-0x0000000007D44000-memory.dmp

          Filesize

          528KB

        • memory/4392-717-0x0000000007CC0000-0x0000000007D4D000-memory.dmp

          Filesize

          564KB

        • memory/4392-719-0x0000000007CC0000-0x0000000007D51000-memory.dmp

          Filesize

          580KB

        • memory/4392-720-0x0000000007CC0000-0x0000000007D43000-memory.dmp

          Filesize

          524KB

        • memory/4392-721-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

          Filesize

          40KB

        • memory/4392-723-0x0000000007CC0000-0x0000000007DCA000-memory.dmp

          Filesize

          1.0MB

        • memory/4392-725-0x0000000007CC0000-0x0000000007DCA000-memory.dmp

          Filesize

          1.0MB

        • memory/4392-727-0x0000000007CC0000-0x0000000007DCA000-memory.dmp

          Filesize

          1.0MB

        • memory/4392-733-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

          Filesize

          40KB

        • memory/4392-735-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

          Filesize

          40KB

        • memory/4392-738-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

          Filesize

          40KB

        • memory/4392-739-0x0000000007CC0000-0x0000000007CCA000-memory.dmp

          Filesize

          40KB

        • memory/4608-636-0x0000000000000000-mapping.dmp