Resubmissions

17-01-2021 19:18

210117-5hwxlye88x 10

17-01-2021 17:05

210117-6jkt8jz44e 10

17-01-2021 10:25

210117-ncy8vksfgn 10

Analysis

  • max time kernel
    156s
  • max time network
    149s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-01-2021 19:18

General

  • Target

    416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe

  • Size

    56.1MB

  • MD5

    2f916f4272d4426fd629810a57a54fb3

  • SHA1

    a4ac414101162bb062ee03d8364d57248e8f1a39

  • SHA256

    416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40

  • SHA512

    f2e4434cb5f9c48187d712fb3f77cca3f0d5acbe985b5f65db54be4ea0ead4942f85e02252455ffb9e82e396c87711ee2af81c6d94d58a966dc246d9233db069

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe
    "C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:748
    • C:\Windows\SysWOW64\calc.exe
      "C:\Windows\SysWOW64\calc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:1500
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:1992
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x05860166" /f
        3⤵
          PID:1188
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x0E7302EC" /f
          3⤵
            PID:612
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x5C000766" /f
            3⤵
              PID:1292
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x6E0A0825" /f
              3⤵
                PID:556
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /query /tn "Windows Debugger"
                3⤵
                  PID:872
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Debugger" /TR "C:\Users\Admin\AppData\Roaming\update\Explorer.exe" /RL HIGHEST
                  3⤵
                  • Creates scheduled task(s)
                  PID:2016
                • C:\Windows\SysWOW64\mspaint.exe
                  "C:\Windows\SysWOW64\mspaint.exe"
                  3⤵
                  • Deletes itself
                  • Adds Run key to start application
                  • Enumerates connected drives
                  • Suspicious use of AdjustPrivilegeToken
                  PID:2044
              • C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe
                "C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe"
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:844

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/748-4-0x0000000000240000-0x0000000000255000-memory.dmp

              Filesize

              84KB

            • memory/748-3-0x0000000000230000-0x0000000000231000-memory.dmp

              Filesize

              4KB

            • memory/748-5-0x00000000002A0000-0x00000000002A1000-memory.dmp

              Filesize

              4KB

            • memory/748-6-0x0000000000400000-0x000000000042D000-memory.dmp

              Filesize

              180KB

            • memory/748-2-0x0000000075EB1000-0x0000000075EB3000-memory.dmp

              Filesize

              8KB

            • memory/844-29-0x0000000000400000-0x000000000044E000-memory.dmp

              Filesize

              312KB

            • memory/844-25-0x0000000000400000-0x000000000044E000-memory.dmp

              Filesize

              312KB

            • memory/1500-30-0x00000000002A0000-0x00000000002EE000-memory.dmp

              Filesize

              312KB

            • memory/1500-41-0x00000000002D8000-0x00000000002D9000-memory.dmp

              Filesize

              4KB

            • memory/1500-9-0x00000000000C0000-0x00000000000C2000-memory.dmp

              Filesize

              8KB

            • memory/1992-38-0x00000000001C9000-0x00000000001CA000-memory.dmp

              Filesize

              4KB

            • memory/1992-7-0x0000000000130000-0x000000000015D000-memory.dmp

              Filesize

              180KB

            • memory/1992-37-0x00000000001B8000-0x00000000001B9000-memory.dmp

              Filesize

              4KB

            • memory/2044-24-0x0000000000A61000-0x0000000000A63000-memory.dmp

              Filesize

              8KB

            • memory/2044-31-0x0000000000180000-0x00000000001CE000-memory.dmp

              Filesize

              312KB

            • memory/2044-36-0x00000000001B8000-0x00000000001B9000-memory.dmp

              Filesize

              4KB

            • memory/2044-35-0x00000000001C9000-0x00000000001CA000-memory.dmp

              Filesize

              4KB

            • memory/2044-40-0x00000000749FA000-0x00000000749FB000-memory.dmp

              Filesize

              4KB

            • memory/2044-21-0x0000000000080000-0x00000000000AD000-memory.dmp

              Filesize

              180KB

            • memory/3624-39-0x000007FEF5E90000-0x000007FEF610A000-memory.dmp

              Filesize

              2.5MB