Analysis

  • max time kernel
    1062s
  • max time network
    385s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-11-2020 14:34

General

  • Target

    SecurityTaskManager_Setup.exe

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • Loads dropped DLL 6 IoCs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Checks whether UAC is enabled 1 TTPs 2 IoCs
  • Drops file in Program Files directory 64 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies registry class 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 9 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecurityTaskManager_Setup.exe
    "C:\Users\Admin\AppData\Local\Temp\SecurityTaskManager_Setup.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3084
    • C:\Users\Admin\AppData\Local\Temp\WZSE0.TMP\setup.exe
      ".\setup.exe"
      2⤵
      • Executes dropped EXE
      • Drops file in Program Files directory
      • Suspicious use of WriteProcessMemory
      PID:2796
      • C:\Windows\SysWOW64\explorer.exe
        "C:\Windows\System32\explorer.exe" "C:\Program Files (x86)\Security Task Manager\taskman.exe"
        3⤵
          PID:1848
    • C:\Windows\explorer.exe
      C:\Windows\explorer.exe /factory,{75dff2b7-6936-4c06-a8bb-676a7b00b24b} -Embedding
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:1956
      • C:\Program Files (x86)\Security Task Manager\TaskMan.exe
        "C:\Program Files (x86)\Security Task Manager\TaskMan.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Checks whether UAC is enabled
        • Modifies registry class
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of SetWindowsHookEx
        PID:1712
    • C:\Program Files (x86)\Security Task Manager\TaskMan.exe
      "C:\Program Files (x86)\Security Task Manager\TaskMan.exe"
      1⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Checks whether UAC is enabled
      • Modifies registry class
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of SetWindowsHookEx
      PID:1612
    • C:\Windows\system32\vssvc.exe
      C:\Windows\system32\vssvc.exe
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:3552

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1612-61-0x0000000004560000-0x0000000004561000-memory.dmp

      Filesize

      4KB

    • memory/1612-317-0x0000000005A30000-0x0000000005A31000-memory.dmp

      Filesize

      4KB

    • memory/1612-322-0x0000000006330000-0x0000000006331000-memory.dmp

      Filesize

      4KB

    • memory/1612-190-0x0000000005A30000-0x0000000005A31000-memory.dmp

      Filesize

      4KB

    • memory/1612-320-0x0000000006330000-0x0000000006331000-memory.dmp

      Filesize

      4KB

    • memory/1612-318-0x0000000006330000-0x0000000006331000-memory.dmp

      Filesize

      4KB

    • memory/1712-189-0x0000000005B70000-0x0000000005B71000-memory.dmp

      Filesize

      4KB

    • memory/1712-324-0x0000000006370000-0x0000000006371000-memory.dmp

      Filesize

      4KB

    • memory/1712-319-0x0000000006700000-0x0000000006701000-memory.dmp

      Filesize

      4KB

    • memory/1712-325-0x0000000006370000-0x0000000006371000-memory.dmp

      Filesize

      4KB

    • memory/1712-377-0x0000000006C40000-0x0000000006C4A000-memory.dmp

      Filesize

      40KB

    • memory/1712-386-0x0000000006C40000-0x0000000006C4A000-memory.dmp

      Filesize

      40KB

    • memory/1712-321-0x0000000006700000-0x0000000006701000-memory.dmp

      Filesize

      4KB

    • memory/1712-62-0x00000000046A0000-0x00000000046A1000-memory.dmp

      Filesize

      4KB