Analysis

  • max time kernel
    147s
  • max time network
    112s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    15/01/2021, 14:32

General

  • Target

    covid21.exe

  • Size

    2.0MB

  • MD5

    1a2e2d295e04f74437652dc9b8a2d03c

  • SHA1

    e3565983ee402856c2cf4eec2ac6ff9636443fe9

  • SHA256

    a078251c61a4f90bf60da47d99cea465be5d44057684d681fb3d94a20d2025bd

  • SHA512

    7d5130ad41c4903aa66fc00b22bc3799ade4b6c3bb82db9aead43158aa03165159b59f8c16d8cf68fb297e69e6a13acc9708669d5916fe52b9254330c1f14df2

Malware Config

Signatures

  • ASPack v2.12-2.42 2 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 4 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Delays execution with timeout.exe 15 IoCs
  • Modifies registry class 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 24 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 102 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\covid21.exe
    "C:\Users\Admin\AppData\Local\Temp\covid21.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:880
    • C:\Windows\SysWOW64\cmd.exe
      C:\Windows\system32\cmd.exe /c ""C:\Users\Admin\AppData\Local\Temp\99B5.tmp\covid21.bat" "
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:3228
      • C:\Users\Admin\AppData\Local\Temp\99B5.tmp\CLWCP.exe
        clwcp c:\covid21\covid.bmp
        3⤵
        • Executes dropped EXE
        • Sets desktop wallpaper using registry
        PID:856
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\covid.vbs"
        3⤵
          PID:1328
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5 /nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:636
        • C:\Users\Admin\AppData\Local\Temp\99B5.tmp\PayloadGDI.exe
          PayloadGDI.exe
          3⤵
          • Executes dropped EXE
          PID:744
        • C:\Windows\SysWOW64\timeout.exe
          timeout 5 /nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:3696
        • C:\Users\Admin\AppData\Local\Temp\99B5.tmp\screenscrew.exe
          screenscrew.exe
          3⤵
          • Executes dropped EXE
          PID:3316
        • C:\Windows\SysWOW64\timeout.exe
          timeout 1 /nobreak
          3⤵
          • Delays execution with timeout.exe
          PID:3676
        • C:\Windows\SysWOW64\WScript.exe
          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
          3⤵
            PID:2244
          • C:\Windows\SysWOW64\timeout.exe
            timeout 1 /nobreak
            3⤵
            • Delays execution with timeout.exe
            PID:1240
          • C:\Windows\SysWOW64\WScript.exe
            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
            3⤵
              PID:3924
            • C:\Windows\SysWOW64\timeout.exe
              timeout 1 /nobreak
              3⤵
              • Delays execution with timeout.exe
              PID:2328
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
              3⤵
                PID:3596
              • C:\Windows\SysWOW64\timeout.exe
                timeout 1 /nobreak
                3⤵
                • Delays execution with timeout.exe
                PID:3176
              • C:\Windows\SysWOW64\WScript.exe
                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                3⤵
                  PID:3356
                • C:\Windows\SysWOW64\timeout.exe
                  timeout 1 /nobreak
                  3⤵
                  • Delays execution with timeout.exe
                  PID:2764
                • C:\Windows\SysWOW64\WScript.exe
                  "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                  3⤵
                    PID:3292
                  • C:\Windows\SysWOW64\timeout.exe
                    timeout 1 /nobreak
                    3⤵
                    • Delays execution with timeout.exe
                    PID:4036
                  • C:\Windows\SysWOW64\WScript.exe
                    "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                    3⤵
                      PID:1772
                    • C:\Windows\SysWOW64\timeout.exe
                      timeout 1 /nobreak
                      3⤵
                      • Delays execution with timeout.exe
                      PID:3520
                    • C:\Windows\SysWOW64\WScript.exe
                      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                      3⤵
                        PID:2132
                      • C:\Windows\SysWOW64\timeout.exe
                        timeout 1 /nobreak
                        3⤵
                        • Delays execution with timeout.exe
                        PID:2272
                      • C:\Windows\SysWOW64\WScript.exe
                        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                        3⤵
                          PID:1924
                        • C:\Windows\SysWOW64\timeout.exe
                          timeout 1 /nobreak
                          3⤵
                          • Delays execution with timeout.exe
                          PID:2192
                        • C:\Windows\SysWOW64\WScript.exe
                          "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                          3⤵
                            PID:3824
                          • C:\Windows\SysWOW64\timeout.exe
                            timeout 1 /nobreak
                            3⤵
                            • Delays execution with timeout.exe
                            PID:1064
                          • C:\Windows\SysWOW64\WScript.exe
                            "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                            3⤵
                              PID:1000
                            • C:\Windows\SysWOW64\timeout.exe
                              timeout 1 /nobreak
                              3⤵
                              • Delays execution with timeout.exe
                              PID:988
                            • C:\Windows\SysWOW64\WScript.exe
                              "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\corona.vbs"
                              3⤵
                                PID:3152
                              • C:\Windows\SysWOW64\timeout.exe
                                timeout 5 /nobreak
                                3⤵
                                • Delays execution with timeout.exe
                                PID:1352
                              • C:\Windows\SysWOW64\WScript.exe
                                "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\covid21.vbs"
                                3⤵
                                  PID:2928
                                • C:\Windows\SysWOW64\timeout.exe
                                  timeout /3 /nobreak
                                  3⤵
                                  • Delays execution with timeout.exe
                                  PID:1984
                                • C:\Users\Admin\AppData\Local\Temp\99B5.tmp\PayloadMBR.exe
                                  PayloadMBR.exe
                                  3⤵
                                  • Executes dropped EXE
                                  • Adds Run key to start application
                                  • Writes to the Master Boot Record (MBR)
                                  • Suspicious behavior: EnumeratesProcesses
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:2428
                                  • C:\Windows\SysWOW64\schtasks.exe
                                    schtasks.exe /Create /TN "Windows Update" /ru SYSTEM /SC ONSTART /TR "C:\Users\Admin\AppData\Local\Temp\99B5.tmp\PayloadMBR.exe"
                                    4⤵
                                    • Creates scheduled task(s)
                                    PID:1480
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 504
                                    4⤵
                                    • Program crash
                                    • Suspicious behavior: EnumeratesProcesses
                                    • Suspicious use of AdjustPrivilegeToken
                                    PID:3828

                            Network

                            MITRE ATT&CK Enterprise v6

                            Replay Monitor

                            Loading Replay Monitor...

                            Downloads

                            • memory/3828-51-0x0000000004720000-0x0000000004721000-memory.dmp

                              Filesize

                              4KB