Analysis

  • max time kernel
    560s
  • max time network
    576s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    09-12-2020 15:31

General

  • Target

    243_BIO_SINOPHARM.exe

  • Size

    4.7MB

  • MD5

    49a34cfbeed733c24392c9217ef46bb6

  • SHA1

    fbe27e84dd553477894242844652a30eb7d713bc

  • SHA256

    f36a0ee7f4ec23765bb28fbfa734e402042278864e246a54b8c4db6f58275662

  • SHA512

    bc939a0b0c8472a3388ccbf298983d6d720e1c740f0f61008713a357b909743e3b1bb3b618f048a25fb95b8b5d8d159e593e5876a4bed0f0e95c7ffa9783ebcd

Score
10/10

Malware Config

Extracted

Family

zebrocy

C2

/managment/cb-secure/technology.php

Signatures

  • Executes dropped EXE 1 IoCs
  • Deletes itself 1 IoCs
  • JavaScript code in executable 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 40 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\243_BIO_SINOPHARM.exe
    "C:\Users\Admin\AppData\Local\Temp\243_BIO_SINOPHARM.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1744
    • C:\Windows\SysWOW64\robocopy.exe
      robocopy C:\Users\Admin\AppData\Local\Temp\ C:\Users\Admin\AppData\Roaming\LigoBar\ *.exe
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1452
    • C:\Windows\SysWOW64\cmd.exe
      cmd.exe "/C forfiles /p c:\windows\system32 /m notepad.exe /C C:\Users\Admin\AppData\Roaming\LigoBar\stom.bat"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Windows\SysWOW64\forfiles.exe
        forfiles /p c:\windows\system32 /m notepad.exe /C C:\Users\Admin\AppData\Roaming\LigoBar\stom.bat"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1848
        • C:\Windows\SysWOW64\cmd.exe
          cmd /c "C:\Users\Admin\AppData\Roaming\LigoBar\stom.bat"
          4⤵
          • Deletes itself
          • Suspicious use of WriteProcessMemory
          PID:1788
          • \??\c:\windows\SysWOW64\schtasks.exe
            schtasks /Create /SC MINUTE /MO 3 /TN SoftwareProtectionPlatform /F /TR "C:\Users\Admin\AppData\Roaming\LigoBar\ndfapi.exe"
            5⤵
            • Creates scheduled task(s)
            PID:1832
          • \??\c:\windows\SysWOW64\cmd.exe
            cmd.exe /C ping localhost -n 3
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1864
            • \??\c:\windows\SysWOW64\PING.EXE
              ping localhost -n 3
              6⤵
              • Runs ping.exe
              PID:1944
          • \??\c:\windows\SysWOW64\cmd.exe
            cmd.exe /C ping localhost -n 7
            5⤵
            • Suspicious use of WriteProcessMemory
            PID:1120
            • \??\c:\windows\SysWOW64\PING.EXE
              ping localhost -n 7
              6⤵
              • Runs ping.exe
              PID:1012
  • C:\Windows\system32\taskeng.exe
    taskeng.exe {5D311F18-D70E-42E9-8E36-16BA81045A21} S-1-5-21-3825035466-2522850611-591511364-1000:EIDQHRRL\Admin:Interactive:[1]
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:616
    • C:\Users\Admin\AppData\Roaming\LigoBar\ndfapi.exe
      C:\Users\Admin\AppData\Roaming\LigoBar\ndfapi.exe
      2⤵
      • Executes dropped EXE
      PID:724

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/724-17-0x0000000000400000-0x00000000008D1000-memory.dmp

    Filesize

    4.8MB

  • memory/1744-2-0x0000000000400000-0x00000000008D1000-memory.dmp

    Filesize

    4.8MB