Analysis

  • max time kernel
    135s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    20-11-2020 05:00

General

  • Target

    TaskMachineNet.exe

  • Size

    4.6MB

  • MD5

    0f20f935559294d2088cfab26843e408

  • SHA1

    85ac819478d1965c134041dfbd4973c0c2335d09

  • SHA256

    5784eef61ea7f9ef95d9559eb8b55b5edf0a362413b4fa9e391de62a9ee5c278

  • SHA512

    bc2a9ae95bfe7e8427dc0961a0d892de8bec64cece3470e7030c4a291d503f189d25e04dd14ca70df00c79ae7356832447c61e1e1a53f248e583b2705f0cbc0a

Malware Config

Signatures

  • Executes dropped EXE 3 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Deletes itself 1 IoCs
  • Loads dropped DLL 3 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Modifies system certificate store 2 TTPs 6 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 19 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\TaskMachineNet.exe
    "C:\Users\Admin\AppData\Local\Temp\TaskMachineNet.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1056
    • C:\Users\Admin\AppData\Local\Temp\is-AAPBQ.tmp\TaskMachineNet.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-AAPBQ.tmp\TaskMachineNet.tmp" /SL5="$50150,4083020,780288,C:\Users\Admin\AppData\Local\Temp\TaskMachineNet.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of WriteProcessMemory
      PID:1980
      • C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSeMg.exe
        "C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSeMg.exe" install
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Adds Run key to start application
        • Modifies system certificate store
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1560
        • C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSe.exe
          "C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSe.exe"
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:1156
      • C:\Windows\SysWOW64\cmd.exe
        "C:\Windows\system32\cmd.exe" /C ""C:\Users\Admin\AppData\Local\Temp\SelfDelete.bat""
        3⤵
        • Deletes itself
        PID:1216

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Install Root Certificate

1
T1130

Discovery

Query Registry

1
T1012

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    d0360afc742325f6f236d42cde2f42e5

    SHA1

    8c2906ca6215edd0ff7c904c0a030c3302f46a01

    SHA256

    e606e8891e4eabd1cb18106dc731ac9792ffad7a84b3563a6e9576658f471d24

    SHA512

    f97177b6b7dfd4eddaa90fdc0eead666816ad97f8f8c0fa23f58617876c3d9826b81fab0e3c4ab3b717bb348b3b1ad9833c55f670f9148f84adc3ce774016f02

  • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
    MD5

    c98af8a5066ed0bf6837e56d618bc9a2

    SHA1

    0ba6eeff4d6d15c53a378345aa393c1a03ff84e9

    SHA256

    b0364850b722c55fd6aedfca18e8555ce7b8d62196444f41ea7b1be3b0034b67

    SHA512

    e9dd0fb5efeb9c463cf3cb84856b28191bc21a9f9b6aeb69997fe102c193cd77c37ce5052787c1156047ab5fcbcf744985e07c2fc3638855837986f27021dbcd

  • C:\Users\Admin\AppData\Local\Temp\SelfDelete.bat
    MD5

    5c1b6223dfd392ba6ff136c291491dfb

    SHA1

    5d13bcda332b97ca28d67bddf651b606ef642eec

    SHA256

    9305e990af2b887afa220d3427929a0dce88b69c7aa265f6e6d327af2a90087a

    SHA512

    d51daeb4f9b02e7b4ced08537b0c49c7e12fc616e07d394b18ab5b875528fe6050b547b0a00d5108a9ec123d070f953d1a1a0de430ba11881cfa3d646d932e7b

  • C:\Users\Admin\AppData\Local\Temp\is-AAPBQ.tmp\TaskMachineNet.tmp
    MD5

    650e4a62107fb4b96626daa3b7b1ff33

    SHA1

    eec6d946f9c4b6d3ae2670b49d50aa209898da44

    SHA256

    ab5819e9008109fca8ca5122c62f6b77c86b494903de6f768e84c0b9e3a13669

    SHA512

    49f89aa91a058d4cc3013d256387135ef26055b6163c7349d9e665cd3869fe5a8ca62720481f81db721d13ce6af1c1991df1be55531ef317d6bba8434209ff90

  • C:\Users\Admin\AppData\Local\Temp\is-AAPBQ.tmp\TaskMachineNet.tmp
    MD5

    650e4a62107fb4b96626daa3b7b1ff33

    SHA1

    eec6d946f9c4b6d3ae2670b49d50aa209898da44

    SHA256

    ab5819e9008109fca8ca5122c62f6b77c86b494903de6f768e84c0b9e3a13669

    SHA512

    49f89aa91a058d4cc3013d256387135ef26055b6163c7349d9e665cd3869fe5a8ca62720481f81db721d13ce6af1c1991df1be55531ef317d6bba8434209ff90

  • C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSe.exe
    MD5

    3f12ea2db4cd4f5845fd4a365e1fda55

    SHA1

    cb01ca598505d465ee5f72544467fc18a08e4a50

    SHA256

    5b99fd8eb7cae1074be00f6d03620eaeeea071a6faa51bfbf76dc2e5ab7216ab

    SHA512

    03415d947ceffbedcbd7f996e32d0b03e771e36f55ff1e262b74ee8a7dd3f2e6596997892f53476b7f17fe07da967252a39563652b4cf0d94835416eca3a9588

  • C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSe.exe
    MD5

    3f12ea2db4cd4f5845fd4a365e1fda55

    SHA1

    cb01ca598505d465ee5f72544467fc18a08e4a50

    SHA256

    5b99fd8eb7cae1074be00f6d03620eaeeea071a6faa51bfbf76dc2e5ab7216ab

    SHA512

    03415d947ceffbedcbd7f996e32d0b03e771e36f55ff1e262b74ee8a7dd3f2e6596997892f53476b7f17fe07da967252a39563652b4cf0d94835416eca3a9588

  • C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSeMg.exe
    MD5

    f835b41c6c9040ff04d9987c09116327

    SHA1

    eafb2f7e7bd55580c561ef22ae2ed9672ed9c3a7

    SHA256

    8deb8f1bd3d1cbe822956492234313cbd7505aa4e865b3302388ecf53bfaed7e

    SHA512

    f9ff76acd7293f1916074f4dd656ae7f3727799da0135d5e756c18df63cac0d4dfc5ba41906a5f8e7de688e6a657c4f321293ac883a1eed68d539b187332f547

  • C:\Users\Admin\AppData\Roaming\WinServiceSup\winconSeMg.exe
    MD5

    f835b41c6c9040ff04d9987c09116327

    SHA1

    eafb2f7e7bd55580c561ef22ae2ed9672ed9c3a7

    SHA256

    8deb8f1bd3d1cbe822956492234313cbd7505aa4e865b3302388ecf53bfaed7e

    SHA512

    f9ff76acd7293f1916074f4dd656ae7f3727799da0135d5e756c18df63cac0d4dfc5ba41906a5f8e7de688e6a657c4f321293ac883a1eed68d539b187332f547

  • \Users\Admin\AppData\Local\Temp\is-AAPBQ.tmp\TaskMachineNet.tmp
    MD5

    650e4a62107fb4b96626daa3b7b1ff33

    SHA1

    eec6d946f9c4b6d3ae2670b49d50aa209898da44

    SHA256

    ab5819e9008109fca8ca5122c62f6b77c86b494903de6f768e84c0b9e3a13669

    SHA512

    49f89aa91a058d4cc3013d256387135ef26055b6163c7349d9e665cd3869fe5a8ca62720481f81db721d13ce6af1c1991df1be55531ef317d6bba8434209ff90

  • \Users\Admin\AppData\Roaming\WinServiceSup\winconSe.exe
    MD5

    3f12ea2db4cd4f5845fd4a365e1fda55

    SHA1

    cb01ca598505d465ee5f72544467fc18a08e4a50

    SHA256

    5b99fd8eb7cae1074be00f6d03620eaeeea071a6faa51bfbf76dc2e5ab7216ab

    SHA512

    03415d947ceffbedcbd7f996e32d0b03e771e36f55ff1e262b74ee8a7dd3f2e6596997892f53476b7f17fe07da967252a39563652b4cf0d94835416eca3a9588

  • \Users\Admin\AppData\Roaming\WinServiceSup\winconSeMg.exe
    MD5

    f835b41c6c9040ff04d9987c09116327

    SHA1

    eafb2f7e7bd55580c561ef22ae2ed9672ed9c3a7

    SHA256

    8deb8f1bd3d1cbe822956492234313cbd7505aa4e865b3302388ecf53bfaed7e

    SHA512

    f9ff76acd7293f1916074f4dd656ae7f3727799da0135d5e756c18df63cac0d4dfc5ba41906a5f8e7de688e6a657c4f321293ac883a1eed68d539b187332f547

  • memory/1156-11-0x0000000000000000-mapping.dmp
  • memory/1216-7-0x0000000000000000-mapping.dmp
  • memory/1560-5-0x0000000000000000-mapping.dmp
  • memory/1980-1-0x0000000000000000-mapping.dmp