Overview

overview

10

Static

static

10

ฺฺฺà...ฺฺ

windows10_x64

ฺฺฺà...ฺฺ

windows10_x64

ฺฺฺà...ฺฺ

windows10_x64

8

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

7

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

1

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

8

ฺฺฺà...ฺฺ

windows10_x64

1

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

8

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

9

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

8

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

5

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

ฺฺฺà...ฺฺ

windows10_x64

10

ฺฺฺà...ฺฺ

windows10_x64

8

ฺฺฺà...ฺฺ

windows10_x64

10

Resubmissions

24-08-2023 11:16

230824-nda8msdf8z 10

05-08-2023 22:52

230805-2tn2bsfa82 10

24-07-2023 06:25

230724-g6s6laag35 10

22-07-2023 15:57

230722-tee6wabg5w 10

20-07-2023 23:19

230720-3bb5gsbf5v 10

20-07-2023 23:06

230720-23f23sba63 10

03-02-2021 11:43

210203-6bgge2nfan 10

22-11-2020 06:42

201122-6x1at779dj 10

Analysis

  • max time kernel
    309s
  • max time network
    324s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    03-02-2021 11:43

General

  • Target

    Endermanch@InternetSecurityGuard.exe

  • Size

    6.1MB

  • MD5

    04155ed507699b4e37532e8371192c0b

  • SHA1

    a14107131237dbb0df750e74281c462a2ea61016

  • SHA256

    b6371644b93b9d3b9b32b2f13f8265f9c23ddecc1e9c5a0291bbf98aa0fc3b77

  • SHA512

    6de59ebbc9b96c8a19d530caa13aa8129531ebd14b3b6c6bbb758426b59ed5ab12483bfa232d853af2e661021231b4b3fcc6c53e187eeba38fa523f673115371

Malware Config

Signatures

  • Checks for common network interception software 1 TTPs

    Looks in the registry for tools like Wireshark or Fiddler commonly used to analyze network activity.

  • Enumerates VirtualBox registry keys 2 TTPs
  • Blocks application from running via registry modification

    Adds application to list of disallowed applications.

  • Drops file in Drivers directory 4 IoCs
  • Sets file execution options in registry 2 TTPs
  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Adds Run key to start application 2 TTPs 4 IoCs
  • Checks for any installed AV software in registry 1 TTPs 1 IoCs
  • Checks installed software on the system 1 TTPs

    Looks up Uninstall key entries in the registry to enumerate software on the system.

  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Modifies Internet Explorer settings 1 TTPs 11 IoCs
  • Modifies data under HKEY_USERS 6 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: EnumeratesProcesses 1314 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of FindShellTrayWindow 2 IoCs
  • Suspicious use of SendNotifyMessage 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 78 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Endermanch@InternetSecurityGuard.exe
    "C:\Users\Admin\AppData\Local\Temp\Endermanch@InternetSecurityGuard.exe"
    1⤵
    • Drops file in Drivers directory
    • Adds Run key to start application
    • Checks for any installed AV software in registry
    • Enumerates connected drives
    • Writes to the Master Boot Record (MBR)
    • Modifies Internet Explorer settings
    • Modifies data under HKEY_USERS
    • Modifies registry class
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of SendNotifyMessage
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3268
    • C:\Windows\SysWOW64\Wbem\mofcomp.exe
      mofcomp "C:\Users\Admin\AppData\Local\Temp\623.mof"
      2⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2372
    • C:\Windows\SysWOW64\netsh.exe
      netsh "firewall" add allowedprogram "C:\Users\Admin\AppData\Local\Temp\Endermanch@InternetSecurityGuard.exe" "Internet Security Guard" ENABLE
      2⤵
        PID:4024
      • C:\Windows\SysWOW64\nslookup.exe
        nslookup -q=txt giluxdfi930jpvz.com 8.8.8.8
        2⤵
          PID:1392
        • C:\Windows\SysWOW64\nslookup.exe
          nslookup -q=txt giluxdfi930jpvz.net 8.8.8.8
          2⤵
            PID:748
          • C:\Windows\SysWOW64\nslookup.exe
            nslookup -q=txt giluxdfi930jpvz.com 208.67.222.222
            2⤵
              PID:2824
            • C:\Windows\SysWOW64\nslookup.exe
              nslookup -q=txt giluxdfi930jpvz.net 208.67.222.222
              2⤵
                PID:3860
              • C:\Windows\SysWOW64\nslookup.exe
                nslookup -q=txt giluxdfi930jpvz.com 8.8.4.4
                2⤵
                  PID:2264
                • C:\Windows\SysWOW64\nslookup.exe
                  nslookup -q=txt giluxdfi930jpvz.net 8.8.4.4
                  2⤵
                    PID:2596
                  • C:\Windows\SysWOW64\nslookup.exe
                    nslookup -q=txt giluxdfi930jpvz.com 208.67.220.220
                    2⤵
                      PID:1148
                    • C:\Windows\SysWOW64\nslookup.exe
                      nslookup -q=txt giluxdfi930jpvz.net 208.67.220.220
                      2⤵
                        PID:1276
                      • C:\Windows\SysWOW64\nslookup.exe
                        nslookup -q=txt fgowwde765eehmo.com 8.8.8.8
                        2⤵
                          PID:3956
                        • C:\Windows\SysWOW64\nslookup.exe
                          nslookup -q=txt fgowwde765eehmo.net 8.8.8.8
                          2⤵
                            PID:2668
                          • C:\Windows\SysWOW64\nslookup.exe
                            nslookup -q=txt fgowwde765eehmo.com 208.67.222.222
                            2⤵
                              PID:2560
                            • C:\Windows\SysWOW64\nslookup.exe
                              nslookup -q=txt fgowwde765eehmo.net 208.67.222.222
                              2⤵
                                PID:3132
                              • C:\Windows\SysWOW64\nslookup.exe
                                nslookup -q=txt fgowwde765eehmo.com 8.8.4.4
                                2⤵
                                  PID:3556
                                • C:\Windows\SysWOW64\nslookup.exe
                                  nslookup -q=txt fgowwde765eehmo.net 8.8.4.4
                                  2⤵
                                    PID:2184
                                  • C:\Windows\SysWOW64\nslookup.exe
                                    nslookup -q=txt fgowwde765eehmo.com 208.67.220.220
                                    2⤵
                                      PID:1952
                                    • C:\Windows\SysWOW64\nslookup.exe
                                      nslookup -q=txt fgowwde765eehmo.net 208.67.220.220
                                      2⤵
                                        PID:2120
                                      • C:\Windows\SysWOW64\nslookup.exe
                                        nslookup -q=txt deeem465uaahims.com 8.8.8.8
                                        2⤵
                                          PID:3864
                                        • C:\Windows\SysWOW64\nslookup.exe
                                          nslookup -q=txt deeem465uaahims.net 8.8.8.8
                                          2⤵
                                            PID:1508
                                          • C:\Windows\SysWOW64\nslookup.exe
                                            nslookup -q=txt deeem465uaahims.com 208.67.222.222
                                            2⤵
                                              PID:4012
                                            • C:\Windows\SysWOW64\nslookup.exe
                                              nslookup -q=txt deeem465uaahims.net 208.67.222.222
                                              2⤵
                                                PID:3276
                                              • C:\Windows\SysWOW64\nslookup.exe
                                                nslookup -q=txt deeem465uaahims.com 8.8.4.4
                                                2⤵
                                                  PID:2640
                                                • C:\Windows\SysWOW64\nslookup.exe
                                                  nslookup -q=txt deeem465uaahims.net 8.8.4.4
                                                  2⤵
                                                    PID:2208
                                                  • C:\Windows\SysWOW64\nslookup.exe
                                                    nslookup -q=txt deeem465uaahims.com 208.67.220.220
                                                    2⤵
                                                      PID:2880
                                                    • C:\Windows\SysWOW64\nslookup.exe
                                                      nslookup -q=txt deeem465uaahims.net 208.67.220.220
                                                      2⤵
                                                        PID:2284

                                                    Network

                                                    MITRE ATT&CK Matrix ATT&CK v6

                                                    Persistence

                                                    Registry Run Keys / Startup Folder

                                                    2
                                                    T1060

                                                    Bootkit

                                                    1
                                                    T1067

                                                    Defense Evasion

                                                    Virtualization/Sandbox Evasion

                                                    1
                                                    T1497

                                                    Modify Registry

                                                    3
                                                    T1112

                                                    Credential Access

                                                    Credentials in Files

                                                    1
                                                    T1081

                                                    Discovery

                                                    Software Discovery

                                                    1
                                                    T1518

                                                    Query Registry

                                                    3
                                                    T1012

                                                    Virtualization/Sandbox Evasion

                                                    1
                                                    T1497

                                                    Security Software Discovery

                                                    1
                                                    T1063

                                                    Peripheral Device Discovery

                                                    1
                                                    T1120

                                                    System Information Discovery

                                                    2
                                                    T1082

                                                    Collection

                                                    Data from Local System

                                                    1
                                                    T1005

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Temp\623.mof
                                                      MD5

                                                      3754f8f8abad5bad797085d0717a9766

                                                      SHA1

                                                      48d92f36cb721b390e216aa03b27b41f25c563fc

                                                      SHA256

                                                      3c77f5f888d417a7a31284cb8c5e3bdb4d926c4a274cecac8a8b2920659d5927

                                                      SHA512

                                                      c59f322ece53c757767e52fe9bfbc3526a13afe9ec7503e3d1cae683eeb55cbb808a1bce720fd58f97f286756d314124bcf797c2167275e08ed93ba759bf3985

                                                    • memory/748-7-0x0000000000000000-mapping.dmp
                                                    • memory/1148-12-0x0000000000000000-mapping.dmp
                                                    • memory/1276-13-0x0000000000000000-mapping.dmp
                                                    • memory/1392-5-0x0000000000000000-mapping.dmp
                                                    • memory/1508-23-0x0000000000000000-mapping.dmp
                                                    • memory/1952-20-0x0000000000000000-mapping.dmp
                                                    • memory/2120-21-0x0000000000000000-mapping.dmp
                                                    • memory/2184-19-0x0000000000000000-mapping.dmp
                                                    • memory/2208-27-0x0000000000000000-mapping.dmp
                                                    • memory/2264-10-0x0000000000000000-mapping.dmp
                                                    • memory/2284-29-0x0000000000000000-mapping.dmp
                                                    • memory/2372-3-0x0000000000000000-mapping.dmp
                                                    • memory/2560-16-0x0000000000000000-mapping.dmp
                                                    • memory/2596-11-0x0000000000000000-mapping.dmp
                                                    • memory/2640-26-0x0000000000000000-mapping.dmp
                                                    • memory/2668-15-0x0000000000000000-mapping.dmp
                                                    • memory/2824-8-0x0000000000000000-mapping.dmp
                                                    • memory/2880-28-0x0000000000000000-mapping.dmp
                                                    • memory/3132-17-0x0000000000000000-mapping.dmp
                                                    • memory/3268-2-0x0000000002150000-0x0000000002151000-memory.dmp
                                                      Filesize

                                                      4KB

                                                    • memory/3276-25-0x0000000000000000-mapping.dmp
                                                    • memory/3556-18-0x0000000000000000-mapping.dmp
                                                    • memory/3860-9-0x0000000000000000-mapping.dmp
                                                    • memory/3864-22-0x0000000000000000-mapping.dmp
                                                    • memory/3956-14-0x0000000000000000-mapping.dmp
                                                    • memory/4012-24-0x0000000000000000-mapping.dmp
                                                    • memory/4024-4-0x0000000000000000-mapping.dmp