Analysis

  • max time kernel
    96s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    01-03-2021 16:58

General

  • Target

    70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd.exe

  • Size

    3.0MB

  • MD5

    2a8c555d8063f4bdd3673185fb315f75

  • SHA1

    8fab3f32aaba682f06fb2652d4c76ac35128b892

  • SHA256

    70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd

  • SHA512

    69fb9943999042939baef8af838fe0ceed9dcf2ce140c1014b07243f2b0fbc0e5cf5630ab5022614df5bbdce440fafb9ff6e86ae58997c6a200433f8a27855e2

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Reads user/profile data of web browsers 2 TTPs

    Infostealers often target stored browser data, which can include saved credentials etc.

  • Accesses cryptocurrency files/wallets, possible credential harvesting 2 TTPs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in Program Files directory 2 IoCs
  • Drops file in Windows directory 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Program crash 2 IoCs
  • Creates scheduled task(s) 1 TTPs 6 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry class 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd.exe
    "C:\Users\Admin\AppData\Local\Temp\70da4cb906561579f992801bfce2c3f1daf01833b292a9bd04545b7e0ee49fbd.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:1456
    • C:\Users\Admin\AppData\Local\Temp\Email Utilita v.3.exe
      "C:\Users\Admin\AppData\Local\Temp\Email Utilita v.3.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of AdjustPrivilegeToken
      PID:3248
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 3248 -s 1516
        3⤵
        • Program crash
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:3784
    • C:\Users\Admin\AppData\Local\Temp\skley.exe
      "C:\Users\Admin\AppData\Local\Temp\skley.exe"
      2⤵
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2480
      • C:\Windows\SysWOW64\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\svcnet\36gZHwdi2ONB6VGB6igMOBpAwhhpWI.vbe"
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:412
        • C:\Windows\SysWOW64\cmd.exe
          C:\Windows\system32\cmd.exe /c ""C:\svcnet\rXbkEPVBoqtghFO1ldESLS15darW9H.bat" "
          4⤵
          • Suspicious use of WriteProcessMemory
          PID:1056
          • C:\svcnet\wt5PReUQn3JKtsXaSVpT.exe
            wt5PReUQn3JKtsXaSVpT.exe -p1297a6a903668fb841d243f0cb871e6e93663d32
            5⤵
            • Executes dropped EXE
            • Modifies registry class
            • Suspicious use of WriteProcessMemory
            PID:4028
            • C:\Windows\SysWOW64\WScript.exe
              "C:\Windows\System32\WScript.exe" "C:\svcnet\tKoT103zYpCgnfW2T7FgT605zAMxxq.vbe"
              6⤵
              • Suspicious use of WriteProcessMemory
              PID:1200
              • C:\Windows\SysWOW64\cmd.exe
                C:\Windows\system32\cmd.exe /c ""C:\svcnet\f0C6IHjg6U72iNQb0DcTDtBNdD6npB.bat" "
                7⤵
                • Suspicious use of WriteProcessMemory
                PID:2144
                • C:\svcnet\svcbroker.exe
                  "C:\svcnet\svcbroker.exe"
                  8⤵
                  • Executes dropped EXE
                  • Drops file in Program Files directory
                  • Drops file in Windows directory
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:508
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "dllhost" /sc ONLOGON /tr "'C:\Users\Default\Favorites\dllhost.exe'" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:212
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Windows\PLA\Reports\en-US\wininit.exe'" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:1644
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "Email Utilita v.3" /sc ONLOGON /tr "'C:\Recovery\WindowsRE\Email Utilita v.3.exe'" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:2072
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "wininit" /sc ONLOGON /tr "'C:\Program Files\7-Zip\Lang\wininit.exe'" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:2936
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "fontdrvhost" /sc ONLOGON /tr "'C:\PerfLogs\fontdrvhost.exe'" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:1252
                  • C:\Windows\SYSTEM32\schtasks.exe
                    "schtasks" /create /tn "ShellExperienceHost" /sc ONLOGON /tr "'C:\PerfLogs\ShellExperienceHost.exe'" /rl HIGHEST /f
                    9⤵
                    • Creates scheduled task(s)
                    PID:2876
                  • C:\PerfLogs\ShellExperienceHost.exe
                    "C:\PerfLogs\ShellExperienceHost.exe"
                    9⤵
                    • Executes dropped EXE
                    • Suspicious behavior: EnumeratesProcesses
                    • Suspicious use of AdjustPrivilegeToken
                    PID:1008
                    • C:\Windows\system32\WerFault.exe
                      C:\Windows\system32\WerFault.exe -u -p 1008 -s 2488
                      10⤵
                      • Program crash
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of AdjustPrivilegeToken
                      PID:2936

Network

MITRE ATT&CK Matrix ATT&CK v6

Execution

Scheduled Task

1
T1053

Persistence

Scheduled Task

1
T1053

Privilege Escalation

Scheduled Task

1
T1053

Credential Access

Credentials in Files

2
T1081

Discovery

System Information Discovery

1
T1082

Collection

Data from Local System

2
T1005

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\PerfLogs\ShellExperienceHost.exe
    MD5

    cea1803314d01a38982b01b10e719c5f

    SHA1

    ad0fa556479c5036a962e5d072a85d90dbfced42

    SHA256

    32fa27a675c9a6371ef3c378bc49f0e50cbca0fa85faf90c51559090eb523961

    SHA512

    5008ce61d5b637fe603bf7b82a4db3c6a88998c42aa53db9ae7257cd0befa3627ee929d7f88bde814a0bd09b70dcced140f27358153788e9fbd01065dc051573

  • C:\PerfLogs\ShellExperienceHost.exe
    MD5

    cea1803314d01a38982b01b10e719c5f

    SHA1

    ad0fa556479c5036a962e5d072a85d90dbfced42

    SHA256

    32fa27a675c9a6371ef3c378bc49f0e50cbca0fa85faf90c51559090eb523961

    SHA512

    5008ce61d5b637fe603bf7b82a4db3c6a88998c42aa53db9ae7257cd0befa3627ee929d7f88bde814a0bd09b70dcced140f27358153788e9fbd01065dc051573

  • C:\Users\Admin\AppData\Local\Temp\Email Utilita v.3.exe
    MD5

    4db516e4cd038b859c323a4b8116a4f2

    SHA1

    02afa9062549df772a665a990dce9551e28aba78

    SHA256

    7751840f4a2ab31819c8bf38d0ef3a81976d4918a436aeb2c3820f9d833060cb

    SHA512

    2ba7734128ab053ac96efa31cf5ffaf90c3c321a85b7ddc52446d6025cdeded59d7af4bb4f7920d65928b68779be54f3e916ce252bdf0d1de5354e86574b0291

  • C:\Users\Admin\AppData\Local\Temp\Email Utilita v.3.exe
    MD5

    4db516e4cd038b859c323a4b8116a4f2

    SHA1

    02afa9062549df772a665a990dce9551e28aba78

    SHA256

    7751840f4a2ab31819c8bf38d0ef3a81976d4918a436aeb2c3820f9d833060cb

    SHA512

    2ba7734128ab053ac96efa31cf5ffaf90c3c321a85b7ddc52446d6025cdeded59d7af4bb4f7920d65928b68779be54f3e916ce252bdf0d1de5354e86574b0291

  • C:\Users\Admin\AppData\Local\Temp\skley.exe
    MD5

    b40c11382e8533919a06da6225e35f87

    SHA1

    851b61726e54e7671d48c60fd9fdaefad3680e5a

    SHA256

    192345b11e53e8d691a67584df68072eb1e8b8d41f4a4b5af7fae19d36ba36c4

    SHA512

    6f96207c09a9720ab1433ee9db6fbc7c4020f127108aa5f9486711da5eca8e13cfaf1702c707d0a0ef081725f9bdeac0902c402f8e3ef9aa0ab3b4fad854e438

  • C:\Users\Admin\AppData\Local\Temp\skley.exe
    MD5

    b40c11382e8533919a06da6225e35f87

    SHA1

    851b61726e54e7671d48c60fd9fdaefad3680e5a

    SHA256

    192345b11e53e8d691a67584df68072eb1e8b8d41f4a4b5af7fae19d36ba36c4

    SHA512

    6f96207c09a9720ab1433ee9db6fbc7c4020f127108aa5f9486711da5eca8e13cfaf1702c707d0a0ef081725f9bdeac0902c402f8e3ef9aa0ab3b4fad854e438

  • C:\svcnet\36gZHwdi2ONB6VGB6igMOBpAwhhpWI.vbe
    MD5

    89f2a626b1c6a81ff99aa0c551b32d2c

    SHA1

    ac03f5b152697bad42f7a620bcd909a4844e9a70

    SHA256

    3fd650cb078f313d718688e8268b29f8bdd6985ad0c62bb48fe72076b2fde1d4

    SHA512

    3b2558d8543bf69ac87f99b037c90afca0caa41dc001717e7efa604e1d330a031a4538701fc2d85095ffd504a2a0cb6508776ef330519e8e687e7a74bd2cf756

  • C:\svcnet\f0C6IHjg6U72iNQb0DcTDtBNdD6npB.bat
    MD5

    9a3c6999de7daa373c8d6ef6084e012e

    SHA1

    33ebff575bd7c78b674ae2befd13b0a76ea05a24

    SHA256

    64cb35508e675702d3b8344abfdc3f450e34fff595e54ef93c94b2b6251d0ceb

    SHA512

    68b6cb0cc45443fe6f50f71bdf1fae6851cd473f42e95ac1e0719b830887fdced974f1cb2c2711150209f09ad8b22388b126d00562674f751120a70a5ba49b19

  • C:\svcnet\rXbkEPVBoqtghFO1ldESLS15darW9H.bat
    MD5

    7207d2e6ce5c15a0f038462623571b7d

    SHA1

    273845925dbd59aaf45a1416bf5a7e42f539dd75

    SHA256

    0319dbb280bd2aeba520c3011f79ff1e47c801c859a52cfecdcb90ad5babfd1f

    SHA512

    13e00e7988a63c924ccc84add93671c329305266e9a8c04f203b9eb4865f38809106fa00bfb112cc616779b1b6148d9c8f154baf885a775c6deef7b5884397ce

  • C:\svcnet\svcbroker.exe
    MD5

    cea1803314d01a38982b01b10e719c5f

    SHA1

    ad0fa556479c5036a962e5d072a85d90dbfced42

    SHA256

    32fa27a675c9a6371ef3c378bc49f0e50cbca0fa85faf90c51559090eb523961

    SHA512

    5008ce61d5b637fe603bf7b82a4db3c6a88998c42aa53db9ae7257cd0befa3627ee929d7f88bde814a0bd09b70dcced140f27358153788e9fbd01065dc051573

  • C:\svcnet\svcbroker.exe
    MD5

    cea1803314d01a38982b01b10e719c5f

    SHA1

    ad0fa556479c5036a962e5d072a85d90dbfced42

    SHA256

    32fa27a675c9a6371ef3c378bc49f0e50cbca0fa85faf90c51559090eb523961

    SHA512

    5008ce61d5b637fe603bf7b82a4db3c6a88998c42aa53db9ae7257cd0befa3627ee929d7f88bde814a0bd09b70dcced140f27358153788e9fbd01065dc051573

  • C:\svcnet\tKoT103zYpCgnfW2T7FgT605zAMxxq.vbe
    MD5

    5f9009c696b3f1b3fba6a8dda6e6a82f

    SHA1

    7685a994e1bd27ebf0a8ab9115c38a444b21337b

    SHA256

    3f5664f8ed53d5b08ed374c92096bcdbae16e353ca738246369863ea4853b857

    SHA512

    91468694a73c2d587c4a0820599d1668554dfb928416a1b4891ca9a1b8d0ef7ec70760902c45f9c453f912914526ffc368d2ec8b162c72063a26220ee4ea1812

  • C:\svcnet\wt5PReUQn3JKtsXaSVpT.exe
    MD5

    0aa400a0f5190c0c2d98ba32f345c916

    SHA1

    d409624813753318c4b82c1fcdb6bcce3c53bc4d

    SHA256

    093b74144ef2cc8fc5fdcbc3a617ed27f2b4b716109207d7d6ca000406f125d1

    SHA512

    31adc275c43af3aaafc5dc76627c61a06dc7fa5972a115f7352035ee04950e537d11e698acfa7d4b260708736974e0a1fe9ea0c24deb61f14fd69396bff26cd1

  • C:\svcnet\wt5PReUQn3JKtsXaSVpT.exe
    MD5

    0aa400a0f5190c0c2d98ba32f345c916

    SHA1

    d409624813753318c4b82c1fcdb6bcce3c53bc4d

    SHA256

    093b74144ef2cc8fc5fdcbc3a617ed27f2b4b716109207d7d6ca000406f125d1

    SHA512

    31adc275c43af3aaafc5dc76627c61a06dc7fa5972a115f7352035ee04950e537d11e698acfa7d4b260708736974e0a1fe9ea0c24deb61f14fd69396bff26cd1

  • memory/212-52-0x0000000000000000-mapping.dmp
  • memory/412-17-0x0000000000000000-mapping.dmp
  • memory/508-51-0x000001ECB4960000-0x000001ECB4962000-memory.dmp
    Filesize

    8KB

  • memory/508-45-0x0000000000000000-mapping.dmp
  • memory/508-49-0x000001EC9A430000-0x000001EC9A431000-memory.dmp
    Filesize

    4KB

  • memory/508-48-0x00007FFB56540000-0x00007FFB56F2C000-memory.dmp
    Filesize

    9.9MB

  • memory/1008-67-0x000001A6BD752000-0x000001A6BD754000-memory.dmp
    Filesize

    8KB

  • memory/1008-66-0x000001A6BD754000-0x000001A6BD755000-memory.dmp
    Filesize

    4KB

  • memory/1008-74-0x000001A6D8FD0000-0x000001A6D8FD1000-memory.dmp
    Filesize

    4KB

  • memory/1008-73-0x000001A6D8E80000-0x000001A6D8E81000-memory.dmp
    Filesize

    4KB

  • memory/1008-72-0x000001A6D8CD4000-0x000001A6D8CD7000-memory.dmp
    Filesize

    12KB

  • memory/1008-71-0x000001A6D8CD0000-0x000001A6D8CD4000-memory.dmp
    Filesize

    16KB

  • memory/1008-70-0x000001A6BD759000-0x000001A6BD75F000-memory.dmp
    Filesize

    24KB

  • memory/1008-69-0x000001A6BD757000-0x000001A6BD759000-memory.dmp
    Filesize

    8KB

  • memory/1008-68-0x000001A6BD755000-0x000001A6BD757000-memory.dmp
    Filesize

    8KB

  • memory/1008-58-0x0000000000000000-mapping.dmp
  • memory/1008-65-0x000001A6D8AB0000-0x000001A6D8AB1000-memory.dmp
    Filesize

    4KB

  • memory/1008-64-0x000001A6BD750000-0x000001A6BD752000-memory.dmp
    Filesize

    8KB

  • memory/1008-61-0x00007FFB56540000-0x00007FFB56F2C000-memory.dmp
    Filesize

    9.9MB

  • memory/1056-32-0x0000000000000000-mapping.dmp
  • memory/1200-36-0x0000000000000000-mapping.dmp
  • memory/1252-56-0x0000000000000000-mapping.dmp
  • memory/1644-53-0x0000000000000000-mapping.dmp
  • memory/2072-54-0x0000000000000000-mapping.dmp
  • memory/2144-44-0x0000000000000000-mapping.dmp
  • memory/2480-5-0x0000000000000000-mapping.dmp
  • memory/2876-57-0x0000000000000000-mapping.dmp
  • memory/2936-55-0x0000000000000000-mapping.dmp
  • memory/2936-75-0x000002EA7B650000-0x000002EA7B651000-memory.dmp
    Filesize

    4KB

  • memory/3248-8-0x0000028042430000-0x0000028042431000-memory.dmp
    Filesize

    4KB

  • memory/3248-16-0x0000028042830000-0x0000028042831000-memory.dmp
    Filesize

    4KB

  • memory/3248-38-0x000002805CE82000-0x000002805CE84000-memory.dmp
    Filesize

    8KB

  • memory/3248-15-0x000002805CE80000-0x000002805CE82000-memory.dmp
    Filesize

    8KB

  • memory/3248-2-0x0000000000000000-mapping.dmp
  • memory/3248-6-0x00007FFB56540000-0x00007FFB56F2C000-memory.dmp
    Filesize

    9.9MB

  • memory/3248-11-0x0000028042850000-0x0000028042857000-memory.dmp
    Filesize

    28KB

  • memory/3248-39-0x000002805CE84000-0x000002805CE85000-memory.dmp
    Filesize

    4KB

  • memory/3248-12-0x0000028042A40000-0x0000028042A41000-memory.dmp
    Filesize

    4KB

  • memory/3784-40-0x00000217A2300000-0x00000217A2301000-memory.dmp
    Filesize

    4KB

  • memory/4028-33-0x0000000000000000-mapping.dmp