Analysis

  • max time kernel
    142s
  • max time network
    70s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    05-05-2021 09:03

General

  • Target

    6b699598_by_Libranalysis.exe

  • Size

    231KB

  • MD5

    6b699598d9b88107f16ea4977a39dd2c

  • SHA1

    28ae2c9fe6ae8ca1e891d32094e159684363cef1

  • SHA256

    de048753f687a726312de3ad7f8f0e05966fdd5207942d4a4a82488ff2936248

  • SHA512

    668ca675242b843f7781df225c4156b2b7722b7f7a5afe9233e45ff587546ac5d35f282f43fc518228ae7591290f4bb0da5aada839bcfe1ee255f98c694d0050

Score
10/10

Malware Config

Signatures

  • Modifies system executable filetype association 2 TTPs 3 IoCs
  • ASPack v2.12-2.42 3 IoCs

    Detects executables packed with ASPack v2.12-2.42

  • Executes dropped EXE 1 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 18 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Program Files directory 1 IoCs
  • Modifies registry class 15 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of WriteProcessMemory 4 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6b699598_by_Libranalysis.exe
    "C:\Users\Admin\AppData\Local\Temp\6b699598_by_Libranalysis.exe"
    1⤵
    • Modifies system executable filetype association
    • Loads dropped DLL
    • Adds Run key to start application
    • Enumerates connected drives
    • Drops file in Program Files directory
    • Modifies registry class
    • Suspicious use of WriteProcessMemory
    PID:484
    • C:\Program Files\DBIK.EXE
      "C:\Program Files\DBIK.EXE"
      2⤵
      • Modifies system executable filetype association
      • Executes dropped EXE
      • Modifies registry class
      • Suspicious behavior: GetForegroundWindowSpam
      PID:2020

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Change Default File Association

1
T1042

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

2
T1112

Discovery

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Program Files\DBIK.EXE
    MD5

    924c50d21f3242ee186d17b17a4e5ed3

    SHA1

    b741dee648d1fe3814f1b6c72b2a7794fd83ebbd

    SHA256

    78bc68c72d693724258e0ea77f7f37e4e048a84271c49385ccdac63ffa3423e0

    SHA512

    a0cca171bdc2f8e046ed45e7426be4e849b29e167711fe722b50b0f857c6b0097428cd77e19ece03c186a98ac73388c83365618f7ef7ed0f0082540162bc9fbe

  • \Program Files\DBIK.EXE
    MD5

    924c50d21f3242ee186d17b17a4e5ed3

    SHA1

    b741dee648d1fe3814f1b6c72b2a7794fd83ebbd

    SHA256

    78bc68c72d693724258e0ea77f7f37e4e048a84271c49385ccdac63ffa3423e0

    SHA512

    a0cca171bdc2f8e046ed45e7426be4e849b29e167711fe722b50b0f857c6b0097428cd77e19ece03c186a98ac73388c83365618f7ef7ed0f0082540162bc9fbe

  • \Program Files\DBIK.EXE
    MD5

    924c50d21f3242ee186d17b17a4e5ed3

    SHA1

    b741dee648d1fe3814f1b6c72b2a7794fd83ebbd

    SHA256

    78bc68c72d693724258e0ea77f7f37e4e048a84271c49385ccdac63ffa3423e0

    SHA512

    a0cca171bdc2f8e046ed45e7426be4e849b29e167711fe722b50b0f857c6b0097428cd77e19ece03c186a98ac73388c83365618f7ef7ed0f0082540162bc9fbe

  • memory/484-63-0x00000000001B0000-0x00000000001B1000-memory.dmp
    Filesize

    4KB

  • memory/2020-61-0x0000000000000000-mapping.dmp
  • memory/2020-64-0x0000000000220000-0x0000000000221000-memory.dmp
    Filesize

    4KB