Analysis

  • max time kernel
    26s
  • max time network
    116s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    07-05-2021 12:56

General

  • Target

    11.exe

  • Size

    1.4MB

  • MD5

    1fc1c860e86a8fbc2021d2567d62f703

  • SHA1

    42ea2c9f4548614574dff36e019ae1cbc68b54e3

  • SHA256

    76005ce2b7eb0c95f8dcc06b501244c73b17b3aff65e78c672c4a6ae56e67306

  • SHA512

    fb48f1837601a1bc7b2057d086414bc4a8478d3a3f17ea216e424d7d7509b825e35be8c7b6afb7ec91604058b2e4e230f8daba46fc04b30d3e0e1b473c20b67c

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 1 IoCs
  • Sets DLL path for service in the registry 2 TTPs
  • UPX packed file 2 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 1 IoCs
  • Drops file in System32 directory 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Drops file in Windows directory 5 IoCs
  • Modifies data under HKEY_USERS 8 IoCs
  • Suspicious behavior: EnumeratesProcesses 10 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\11.exe
    "C:\Users\Admin\AppData\Local\Temp\11.exe"
    1⤵
    • Drops file in Windows directory
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3952
    • C:\Windows\SysWOW64\netsh.exe
      netsh ipsec static add policy name=Block
      2⤵
        PID:1812
      • C:\Windows\SysWOW64\netsh.exe
        netsh ipsec static add filterlist name=Filter1
        2⤵
          PID:2772
        • C:\Windows\SysWOW64\netsh.exe
          netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=135 protocol=TCP
          2⤵
            PID:3964
          • C:\Windows\SysWOW64\netsh.exe
            netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=135 protocol=UDP
            2⤵
              PID:3508
            • C:\Windows\SysWOW64\netsh.exe
              netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=139 protocol=TCP
              2⤵
                PID:2004
              • C:\Windows\SysWOW64\netsh.exe
                netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=139 protocol=UDP
                2⤵
                  PID:1472
                • C:\Windows\SysWOW64\netsh.exe
                  netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=445 protocol=TCP
                  2⤵
                    PID:1028
                  • C:\Windows\SysWOW64\netsh.exe
                    netsh ipsec static add filter filterlist=Filter1 srcaddr=any dstaddr=Me dstport=445 protocol=UDP
                    2⤵
                      PID:1168
                    • C:\Windows\SysWOW64\netsh.exe
                      netsh ipsec static add filteraction name=FilteraAtion1 action=block
                      2⤵
                        PID:2788
                      • C:\Windows\SysWOW64\netsh.exe
                        netsh ipsec static add rule name=Rule1 policy=Block filterlist=Filter1 filteraction=FilteraAtion1
                        2⤵
                          PID:200
                        • C:\Windows\SysWOW64\netsh.exe
                          netsh ipsec static set policy name=Block assign=y
                          2⤵
                            PID:2816
                          • C:\Windows\SysWOW64\cmd.exe
                            cmd.exe /c del "C:\Users\Admin\AppData\Local\Temp\11.exe"
                            2⤵
                              PID:1472
                          • \??\c:\windows\syswow64\svchost.exe
                            c:\windows\syswow64\svchost.exe -k graphicsperf_svcsgroup -s GraphicsPerf_Svcs
                            1⤵
                            • Loads dropped DLL
                            • Suspicious use of SetThreadContext
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:3712
                            • C:\Windows\SysWOW64\svchost.exe
                              C:\Windows\system32\svchost.exe
                              2⤵
                              • Drops file in System32 directory
                              • Drops file in Windows directory
                              • Modifies data under HKEY_USERS
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:3872
                              • C:\Windows\Cursors\wudfhosts.exe
                                C:\Windows\Cursors\wudfhosts.exe -o xmr.usa-138.com:80 -u 4B7yFmYw2qvEtWZDDnZVeY16HHpwTtuYBg6EMn5xdDbM3ggSEnQFDWDHH6cqdEYaPx4iQvAwLNu8NLc21QxDU84GGxZEY7S
                                3⤵
                                • Executes dropped EXE
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2432

                          Network

                          MITRE ATT&CK Matrix ATT&CK v6

                          Persistence

                          Registry Run Keys / Startup Folder

                          1
                          T1060

                          Defense Evasion

                          Modify Registry

                          1
                          T1112

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Windows\Cursors\WUDFhosts.exe
                            MD5

                            4a72e30c0a582b082030adfd8345014f

                            SHA1

                            2f92ccf13f8dfc7eeff49903a0d1ea8dd97a7353

                            SHA256

                            e1315c41f50a75c308cdb023f7e48c0aa62931d5771ad8bc4220018ed5d7f976

                            SHA512

                            8a75925b0695284105856823190531dc4cfcf32a8ae3226ef8c1f796185aa01f8c085b6457a63b1cf81842da2c6baafd4cabf7565a8d96d3460054439bbfb798

                          • C:\Windows\Cursors\wudfhosts.exe
                            MD5

                            4a72e30c0a582b082030adfd8345014f

                            SHA1

                            2f92ccf13f8dfc7eeff49903a0d1ea8dd97a7353

                            SHA256

                            e1315c41f50a75c308cdb023f7e48c0aa62931d5771ad8bc4220018ed5d7f976

                            SHA512

                            8a75925b0695284105856823190531dc4cfcf32a8ae3226ef8c1f796185aa01f8c085b6457a63b1cf81842da2c6baafd4cabf7565a8d96d3460054439bbfb798

                          • \??\c:\windows\help\active_desktop_render.dll
                            MD5

                            14e2b194b652d4fd912404775a6ae898

                            SHA1

                            e93f529bb61e12c41426cb2b86176bf0af387c09

                            SHA256

                            24ca5f0220c6bbcb081de1cd4e4115bb026cd45dbe34fc462a40b241b026d66c

                            SHA512

                            b2ee0b06da1a42c04ef54e36f4a66720698e1c2d58545854d0989ae805d00e760b8bc8815ab00dd8be208f7816ed4249855c9fa506427c1f89a3dfb309c734d6

                          • \Windows\Help\active_desktop_render.dll
                            MD5

                            14e2b194b652d4fd912404775a6ae898

                            SHA1

                            e93f529bb61e12c41426cb2b86176bf0af387c09

                            SHA256

                            24ca5f0220c6bbcb081de1cd4e4115bb026cd45dbe34fc462a40b241b026d66c

                            SHA512

                            b2ee0b06da1a42c04ef54e36f4a66720698e1c2d58545854d0989ae805d00e760b8bc8815ab00dd8be208f7816ed4249855c9fa506427c1f89a3dfb309c734d6

                          • memory/200-123-0x0000000000000000-mapping.dmp
                          • memory/1028-120-0x0000000000000000-mapping.dmp
                          • memory/1168-121-0x0000000000000000-mapping.dmp
                          • memory/1472-119-0x0000000000000000-mapping.dmp
                          • memory/1472-126-0x0000000000000000-mapping.dmp
                          • memory/1812-114-0x0000000000000000-mapping.dmp
                          • memory/2004-118-0x0000000000000000-mapping.dmp
                          • memory/2432-142-0x000001F57FE00000-0x000001F57FE10000-memory.dmp
                            Filesize

                            64KB

                          • memory/2432-143-0x000001F57FE10000-0x000001F57FE20000-memory.dmp
                            Filesize

                            64KB

                          • memory/2432-141-0x000001F57FBF0000-0x000001F57FC00000-memory.dmp
                            Filesize

                            64KB

                          • memory/2432-140-0x000001F57F590000-0x000001F57F5A0000-memory.dmp
                            Filesize

                            64KB

                          • memory/2432-138-0x0000000000000000-mapping.dmp
                          • memory/2772-115-0x0000000000000000-mapping.dmp
                          • memory/2788-122-0x0000000000000000-mapping.dmp
                          • memory/2816-124-0x0000000000000000-mapping.dmp
                          • memory/3508-117-0x0000000000000000-mapping.dmp
                          • memory/3872-131-0x0000000010000000-0x000000001010C000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3872-133-0x0000000010072B6D-mapping.dmp
                          • memory/3872-136-0x0000000010000000-0x000000001010C000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3872-130-0x0000000010000000-0x000000001010C000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3872-129-0x0000000010000000-0x000000001010C000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3872-128-0x0000000010000000-0x000000001010C000-memory.dmp
                            Filesize

                            1.0MB

                          • memory/3964-116-0x0000000000000000-mapping.dmp