Resubmissions

10-03-2021 18:15

210310-b51q1j5ze2 10

10-03-2021 18:04

210310-nrazww2z22 8

Analysis

  • max time kernel
    10s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    10-03-2021 18:04

General

  • Target

    LabPicV3.exe

  • Size

    609KB

  • MD5

    71e31fe2bc2f0638e1c054a85d0ac8fd

  • SHA1

    6537ec2c48de3444269e6de66936e6ec16d64aba

  • SHA256

    5b94656d770bfe78bb31e165e9a72f9cc3ec28c547973bb84d0d6b799f3bfa5a

  • SHA512

    8131e1e2f350c030c036c67cdd480cba24aed47ef9274f7300f493aeaeb7b6b89929ad5ff53888ec27d94c85fab3d5276d2228d61879f716fabce69db3bab88c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 5 IoCs
  • Modifies system certificate store 2 TTPs 7 IoCs
  • Suspicious use of WriteProcessMemory 14 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\LabPicV3.exe
    "C:\Users\Admin\AppData\Local\Temp\LabPicV3.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1900
    • C:\Users\Admin\AppData\Local\Temp\is-F6I7S.tmp\LabPicV3.tmp
      "C:\Users\Admin\AppData\Local\Temp\is-F6I7S.tmp\LabPicV3.tmp" /SL5="$50152,298255,214528,C:\Users\Admin\AppData\Local\Temp\LabPicV3.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Modifies system certificate store
      • Suspicious use of WriteProcessMemory
      PID:1596
      • C:\Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\def.exe
        "C:\Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\def.exe" /S /UID=lab214
        3⤵
        • Executes dropped EXE
        • Suspicious use of WriteProcessMemory
        PID:916
        • C:\Windows\Microsoft.NET\Framework64\v2.0.50727\dw20.exe
          dw20.exe -x -s 920
          4⤵
            PID:1636

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Defense Evasion

    Install Root Certificate

    1
    T1130

    Modify Registry

    1
    T1112

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\is-F6I7S.tmp\LabPicV3.tmp
      MD5

      00743db57d25bfffb54369b2ccaee44e

      SHA1

      388cb06d0a69b28a2d722b24f9c4f32ce13a02af

      SHA256

      818ea3e28f6a2b046a2086b7ba9f2c939e60a98e0489ce7338c5379616345f54

      SHA512

      36163668a99501856c012f97d445775dc38f429c398b28d0dd1c072c0e0ead17854ab26fd24666727b55f420b9b8b7db7b1091f874c5722a88d1588e8bab5875

    • C:\Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\def.exe
      MD5

      8f4c8711382f5ac72b44a3517bb1eaf5

      SHA1

      613b19c39cbaa018e6b187ec2d5ba46e87388175

      SHA256

      5225d4196bbc43dd100ca5c045994ac591092aa3a92b66bd17f8ffbcc4ead262

      SHA512

      8cd64ab48ee93599cd8db5a9f1bb0f08c1b18faee4aae0e59dd4f6417c3cb213576318059076b21f469a480ff2bde332f05cb07e7780fcb272529ccee7ef41f2

    • C:\Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\def.exe
      MD5

      8f4c8711382f5ac72b44a3517bb1eaf5

      SHA1

      613b19c39cbaa018e6b187ec2d5ba46e87388175

      SHA256

      5225d4196bbc43dd100ca5c045994ac591092aa3a92b66bd17f8ffbcc4ead262

      SHA512

      8cd64ab48ee93599cd8db5a9f1bb0f08c1b18faee4aae0e59dd4f6417c3cb213576318059076b21f469a480ff2bde332f05cb07e7780fcb272529ccee7ef41f2

    • \Users\Admin\AppData\Local\Temp\is-F6I7S.tmp\LabPicV3.tmp
      MD5

      00743db57d25bfffb54369b2ccaee44e

      SHA1

      388cb06d0a69b28a2d722b24f9c4f32ce13a02af

      SHA256

      818ea3e28f6a2b046a2086b7ba9f2c939e60a98e0489ce7338c5379616345f54

      SHA512

      36163668a99501856c012f97d445775dc38f429c398b28d0dd1c072c0e0ead17854ab26fd24666727b55f420b9b8b7db7b1091f874c5722a88d1588e8bab5875

    • \Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\_isetup\_shfoldr.dll
      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\_isetup\_shfoldr.dll
      MD5

      92dc6ef532fbb4a5c3201469a5b5eb63

      SHA1

      3e89ff837147c16b4e41c30d6c796374e0b8e62c

      SHA256

      9884e9d1b4f8a873ccbd81f8ad0ae257776d2348d027d811a56475e028360d87

      SHA512

      9908e573921d5dbc3454a1c0a6c969ab8a81cc2e8b5385391d46b1a738fb06a76aa3282e0e58d0d2ffa6f27c85668cd5178e1500b8a39b1bbae04366ae6a86d3

    • \Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\def.exe
      MD5

      8f4c8711382f5ac72b44a3517bb1eaf5

      SHA1

      613b19c39cbaa018e6b187ec2d5ba46e87388175

      SHA256

      5225d4196bbc43dd100ca5c045994ac591092aa3a92b66bd17f8ffbcc4ead262

      SHA512

      8cd64ab48ee93599cd8db5a9f1bb0f08c1b18faee4aae0e59dd4f6417c3cb213576318059076b21f469a480ff2bde332f05cb07e7780fcb272529ccee7ef41f2

    • \Users\Admin\AppData\Local\Temp\is-P9QIE.tmp\idp.dll
      MD5

      8f995688085bced38ba7795f60a5e1d3

      SHA1

      5b1ad67a149c05c50d6e388527af5c8a0af4343a

      SHA256

      203d7b61eac96de865ab3b586160e72c78d93ab5532b13d50ef27174126fd006

      SHA512

      043d41947ab69fc9297dcb5ad238acc2c35250d1172869945ed1a56894c10f93855f0210cbca41ceee9efb55fd56a35a4ec03c77e252409edc64bfb5fb821c35

    • memory/412-12-0x000007FEF76B0000-0x000007FEF792A000-memory.dmp
      Filesize

      2.5MB

    • memory/916-17-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp
      Filesize

      9.6MB

    • memory/916-19-0x0000000000AB0000-0x0000000000AB2000-memory.dmp
      Filesize

      8KB

    • memory/916-18-0x000007FEF5440000-0x000007FEF5DDD000-memory.dmp
      Filesize

      9.6MB

    • memory/916-14-0x0000000000000000-mapping.dmp
    • memory/1596-4-0x0000000000000000-mapping.dmp
    • memory/1596-11-0x0000000000240000-0x0000000000241000-memory.dmp
      Filesize

      4KB

    • memory/1636-20-0x0000000000000000-mapping.dmp
    • memory/1636-21-0x0000000001F50000-0x0000000001F61000-memory.dmp
      Filesize

      68KB

    • memory/1636-22-0x000007FEFBBF1000-0x000007FEFBBF3000-memory.dmp
      Filesize

      8KB

    • memory/1636-23-0x00000000003A0000-0x00000000003A1000-memory.dmp
      Filesize

      4KB

    • memory/1900-10-0x0000000000401000-0x000000000040B000-memory.dmp
      Filesize

      40KB

    • memory/1900-2-0x0000000076271000-0x0000000076273000-memory.dmp
      Filesize

      8KB