Resubmissions

12/01/2021, 11:18

210112-grlybxw2l6 8

Analysis

  • max time kernel
    80s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    12/01/2021, 11:18

General

  • Target

    0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe

  • Size

    1.5MB

  • MD5

    50a5e891da27e63d54e68511e48aa026

  • SHA1

    87073d85a7ba420b15c8bb9a9e4adc64db2bcfef

  • SHA256

    0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6

  • SHA512

    6df8811e3e1f6a4110ca3b7c498af13898b46962a30888879180b2f11dda24344a1de4807663d46dd86f7ea11855d08137980cc85fe71e688d082f2f79994909

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 9 IoCs
  • Loads dropped DLL 16 IoCs
  • JavaScript code in executable 8 IoCs
  • Drops file in Windows directory 4 IoCs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Modifies Internet Explorer settings 1 TTPs 65 IoCs
  • Suspicious use of AdjustPrivilegeToken 14 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 92 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe
    "C:\Users\Admin\AppData\Local\Temp\0788aaea249d92a84f70047efcacaa54c26320b439c490ba3ce00457955031d6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:848
    • C:\Windows\SysWOW64\cmd.exe
      "C:\Windows\system32\cmd.exe" /C START "" "C:\Users\Admin\AppData\Local\Temp\interface.lnk"
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:2020
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\Users\Admin\AppData\Local\Temp\interface.cmd" "
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Windows\SysWOW64\mode.com
          MODE CON: COLS=76 LINES=15
          4⤵
            PID:1712
          • C:\Windows\SysWOW64\findstr.exe
            FINDSTR /I /R /C:"version 5\.[0-1]\."
            4⤵
              PID:1336
            • C:\Windows\SysWOW64\cmd.exe
              C:\Windows\system32\cmd.exe /S /D /c" VER "
              4⤵
                PID:1684
              • C:\Windows\SysWOW64\waitfor.exe
                WAITFOR unlock
                4⤵
                  PID:1232
            • C:\Users\Admin\AppData\Local\Temp\detection.exe
              "C:\Users\Admin\AppData\Local\Temp\detection.exe"
              2⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of WriteProcessMemory
              PID:1976
              • C:\Users\Admin\AppData\Local\Temp\curl_x64.exe
                "C:\Users\Admin\AppData\Local\Temp\curl_x64.exe" --connect-timeout 5 --max-time 20 --fail --silent --request GET "https://www.touslesdrivers.com/php/mes_drivers/version.php?v_version=3.0.4"
                3⤵
                • Executes dropped EXE
                PID:1212
              • C:\Windows\SysWOW64\WAITFOR.exe
                WAITFOR /S EIDQHRRL /SI unlock
                3⤵
                  PID:760
                • C:\Windows\SysWOW64\SC.exe
                  SC query Winmgmt
                  3⤵
                    PID:1520
                  • C:\Windows\SysWOW64\WAITFOR.exe
                    WAITFOR /S EIDQHRRL /SI unlock
                    3⤵
                      PID:1776
                    • C:\Users\Admin\AppData\Local\Temp\detect_x64.exe
                      "C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" driverfiles 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*
                      3⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1592
                    • C:\Users\Admin\AppData\Local\Temp\detect_x64.exe
                      "C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" drivernodes 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*
                      3⤵
                      • Executes dropped EXE
                      • Drops file in Windows directory
                      • Suspicious use of AdjustPrivilegeToken
                      PID:1572
                    • C:\Users\Admin\AppData\Local\Temp\detect_x64.exe
                      "C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" hwids 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*
                      3⤵
                      • Executes dropped EXE
                      PID:2016
                    • C:\Users\Admin\AppData\Local\Temp\detect_x64.exe
                      "C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" stack 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*
                      3⤵
                      • Executes dropped EXE
                      PID:1700
                    • C:\Users\Admin\AppData\Local\Temp\detect_x64.exe
                      "C:\Users\Admin\AppData\Local\Temp\detect_x64.exe" status 1394\* DISPLAY\* HDAUDIO\* HID\* MONITOR\* PCI\* PCMCIA\* SBP2\* SD\* USB\*
                      3⤵
                      • Executes dropped EXE
                      PID:1256
                    • C:\Windows\SysWOW64\WAITFOR.exe
                      WAITFOR /S EIDQHRRL /SI unlock
                      3⤵
                        PID:772
                      • C:\Users\Admin\AppData\Local\Temp\aes_x64.exe
                        "C:\Users\Admin\AppData\Local\Temp\aes_x64.exe" -e -p anT^UpFuzpuC@lOvsoPVe2kiNTidaBo<zI]BeaRnU0ResFwAy@dEnuCkUd)hAzOh -o "C:\Users\Admin\AppData\Local\Temp\d4p7vI6in4nJzd2L\d4p7vI6in4nJzd2L" -
                        3⤵
                        • Executes dropped EXE
                        PID:1060
                      • C:\Users\Admin\AppData\Local\Temp\curl_x64.exe
                        "C:\Users\Admin\AppData\Local\Temp\curl_x64.exe" --connect-timeout 5 --max-time 20 --fail --silent --request POST --form "v_configuration=<C:\Users\Admin\AppData\Local\Temp\d4p7vI6in4nJzd2L\d4p7vI6in4nJzd2L" "https://www.touslesdrivers.com/php/mes_drivers/envoi.php?v_id=d4p7vI6in4nJzd2L&v_version=3.0.4"
                        3⤵
                        • Executes dropped EXE
                        PID:816
                      • C:\Windows\SysWOW64\cmd.exe
                        "C:\Windows\system32\cmd.exe" /C START "" "http://www.touslesdrivers.com/index.php?v_page=31&v_id=d4p7vI6in4nJzd2L"
                        3⤵
                          PID:1696
                          • C:\Program Files\Internet Explorer\iexplore.exe
                            "C:\Program Files\Internet Explorer\iexplore.exe" http://www.touslesdrivers.com/index.php?v_page=31&v_id=d4p7vI6in4nJzd2L
                            4⤵
                            • Modifies Internet Explorer settings
                            • Suspicious use of FindShellTrayWindow
                            • Suspicious use of SetWindowsHookEx
                            PID:1184
                            • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
                              "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1184 CREDAT:275457 /prefetch:2
                              5⤵
                              • Modifies Internet Explorer settings
                              • Suspicious use of SetWindowsHookEx
                              PID:772
                        • C:\Windows\SysWOW64\WAITFOR.exe
                          WAITFOR /S EIDQHRRL /SI unlock
                          3⤵
                            PID:1412

                      Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • memory/1604-53-0x000007FEF6580000-0x000007FEF67FA000-memory.dmp

                              Filesize

                              2.5MB