Resubmissions

17-01-2021 19:18

210117-5hwxlye88x 10

17-01-2021 17:05

210117-6jkt8jz44e 10

17-01-2021 10:25

210117-ncy8vksfgn 10

Analysis

  • max time kernel
    157s
  • max time network
    169s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    17-01-2021 10:25

General

  • Target

    416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe

  • Size

    56.1MB

  • MD5

    2f916f4272d4426fd629810a57a54fb3

  • SHA1

    a4ac414101162bb062ee03d8364d57248e8f1a39

  • SHA256

    416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40

  • SHA512

    f2e4434cb5f9c48187d712fb3f77cca3f0d5acbe985b5f65db54be4ea0ead4942f85e02252455ffb9e82e396c87711ee2af81c6d94d58a966dc246d9233db069

Score
7/10

Malware Config

Signatures

  • Deletes itself 1 IoCs
  • Adds Run key to start application 2 TTPs 5 IoCs
  • Enumerates connected drives 3 TTPs 24 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Program Files directory 2 IoCs
  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 7 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 57 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe
    "C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe"
    1⤵
    • Suspicious use of SetThreadContext
    • Suspicious use of WriteProcessMemory
    PID:1104
    • C:\Windows\SysWOW64\calc.exe
      "C:\Windows\SysWOW64\calc.exe"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2032
    • C:\Windows\SysWOW64\svchost.exe
      "C:\Windows\SysWOW64\svchost.exe"
      2⤵
      • Adds Run key to start application
      • Enumerates connected drives
      • Drops file in Program Files directory
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of WriteProcessMemory
      PID:2008
      • C:\Windows\SysWOW64\schtasks.exe
        "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x05860166" /f
        3⤵
          PID:1788
        • C:\Windows\SysWOW64\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x0E7302EC" /f
          3⤵
            PID:1756
          • C:\Windows\SysWOW64\schtasks.exe
            "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x5C000766" /f
            3⤵
              PID:896
            • C:\Windows\SysWOW64\schtasks.exe
              "C:\Windows\System32\schtasks.exe" /delete /tn "Windows Update Check - 0x6E0A0825" /f
              3⤵
                PID:1452
              • C:\Windows\SysWOW64\schtasks.exe
                "C:\Windows\System32\schtasks.exe" /query /tn "Windows Debugger"
                3⤵
                  PID:1072
                • C:\Windows\SysWOW64\schtasks.exe
                  "C:\Windows\System32\schtasks.exe" /CREATE /SC ONLOGON /TN "Windows Debugger" /TR "C:\Users\Admin\AppData\Roaming\update\Explorer.exe" /RL HIGHEST
                  3⤵
                  • Creates scheduled task(s)
                  PID:816
                • C:\Windows\SysWOW64\mspaint.exe
                  "C:\Windows\SysWOW64\mspaint.exe"
                  3⤵
                  • Deletes itself
                  • Adds Run key to start application
                  • Enumerates connected drives
                  • Suspicious use of AdjustPrivilegeToken
                  PID:652
              • C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe
                "C:\Users\Admin\AppData\Local\Temp\416baeb19adb37e66000e685e04d70586b022f5d36ae411080f89e5590bb8f40.exe"
                2⤵
                • Suspicious behavior: EnumeratesProcesses
                • Suspicious use of AdjustPrivilegeToken
                • Suspicious use of WriteProcessMemory
                PID:1400

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/652-19-0x00000000003C0000-0x000000000040E000-memory.dmp

              Filesize

              312KB

            • memory/652-13-0x0000000000080000-0x00000000000AD000-memory.dmp

              Filesize

              180KB

            • memory/1400-17-0x0000000000400000-0x000000000044E000-memory.dmp

              Filesize

              312KB

            • memory/1400-15-0x0000000000400000-0x000000000044E000-memory.dmp

              Filesize

              312KB

            • memory/2008-3-0x00000000000B0000-0x00000000000B1000-memory.dmp

              Filesize

              4KB

            • memory/2008-5-0x0000000000080000-0x00000000000AD000-memory.dmp

              Filesize

              180KB

            • memory/2032-2-0x0000000000080000-0x0000000000082000-memory.dmp

              Filesize

              8KB

            • memory/2032-18-0x0000000000260000-0x00000000002AE000-memory.dmp

              Filesize

              312KB

            • memory/3504-20-0x000007FEF7510000-0x000007FEF778A000-memory.dmp

              Filesize

              2.5MB