Resubmissions

03-07-2024 16:04

240703-thygmaycpc 10

01-07-2024 18:12

240701-ws6xvswbkj 10

01-07-2024 18:03

240701-wm5sls1gka 10

01-07-2024 18:03

240701-wm39sa1gjf 10

01-07-2024 18:03

240701-wm2e7avhkj 10

01-07-2024 18:03

240701-wmzxcs1fre 10

01-07-2024 18:02

240701-wmzats1frc 10

01-07-2024 18:02

240701-wmvbwa1fqh 10

22-11-2023 17:02

231122-vkac9adg64 10

Analysis

  • max time kernel
    1794s
  • max time network
    429s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    19-11-2020 13:14

General

  • Target

    SecurityTaskManager_Setup.exe

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Checks computer location settings 2 TTPs 1 IoCs

    Looks up country code configured in the registry, likely geofence.

  • Loads dropped DLL 3 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks SCSI registry key(s) 3 TTPs 64 IoCs

    SCSI information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 2 IoCs
  • Modifies registry class 3 IoCs
  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious use of AdjustPrivilegeToken 17 IoCs
  • Suspicious use of SetWindowsHookEx 5 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecurityTaskManager_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\SecurityTaskManager_Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1052
    • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\setup.exe
      ".\setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:3796
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" "C:\Program Files (x86)\Security Task Manager\taskman.exe"
        3⤵
          PID:496
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2596
      • C:\Program Files (x86)\Security Task Manager\TaskMan.exe
        "C:\Program Files (x86)\Security Task Manager\TaskMan.exe"
        2⤵
        • Executes dropped EXE
        • Checks computer location settings
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:8
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3800
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3980
    • \??\c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s DsmSvc
      1⤵
      • Checks SCSI registry key(s)
      • Modifies data under HKEY_USERS
      PID:3036
    • C:\Windows\system32\srtasks.exe
      C:\Windows\system32\srtasks.exe ExecuteScopeRestorePoint /WaitForRestorePoint:2
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1076

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/8-204-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-310-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-203-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-552-0x0000000006690000-0x000000000669A000-memory.dmp

      Filesize

      40KB

    • memory/8-205-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-206-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-207-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-208-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-209-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-210-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-212-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-211-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-213-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-214-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-216-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-215-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-217-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-218-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-219-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-221-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-220-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-222-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-223-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-224-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-225-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-226-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-227-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-228-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-229-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-230-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-254-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-300-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-301-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-302-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-303-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-304-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-305-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-306-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-307-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-308-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-309-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-202-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-311-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-312-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-313-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-314-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-315-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-316-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-317-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-318-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-319-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-320-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-321-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-323-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-201-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-200-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-199-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-198-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-197-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-196-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-195-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-194-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-193-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-192-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-191-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-190-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-189-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-188-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-187-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-186-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-185-0x0000000006470000-0x0000000006471000-memory.dmp

      Filesize

      4KB

    • memory/8-121-0x0000000005B70000-0x0000000005B71000-memory.dmp

      Filesize

      4KB

    • memory/8-57-0x00000000046A0000-0x00000000046A1000-memory.dmp

      Filesize

      4KB

    • memory/8-485-0x0000000006CA0000-0x0000000006DAA000-memory.dmp

      Filesize

      1.0MB

    • memory/8-497-0x0000000006CA0000-0x0000000006DAA000-memory.dmp

      Filesize

      1.0MB

    • memory/8-501-0x0000000006CA0000-0x0000000006DAA000-memory.dmp

      Filesize

      1.0MB

    • memory/8-505-0x0000000006CA0000-0x0000000006DAA000-memory.dmp

      Filesize

      1.0MB

    • memory/8-549-0x0000000007A50000-0x0000000007A54000-memory.dmp

      Filesize

      16KB

    • memory/8-541-0x00000000046A0000-0x00000000046A1000-memory.dmp

      Filesize

      4KB

    • memory/8-542-0x00000000046A0000-0x00000000046A1000-memory.dmp

      Filesize

      4KB

    • memory/8-546-0x0000000007A50000-0x0000000007A54000-memory.dmp

      Filesize

      16KB