Analysis
-
max time kernel
150s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
11-05-2021 10:33
Static task
static1
Behavioral task
behavioral1
Sample
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe
Resource
win7v20210410
General
-
Target
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe
-
Size
253KB
-
MD5
a4166b3570c3c1165c68c7ceb9aa8c65
-
SHA1
6f8637d1f10743a9e43abe646b44b7bb63abc1e7
-
SHA256
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81
-
SHA512
1953a35d3d6174aee555ffee66070ac02799f1410f7ced6692e3856b1b42e5cf5db4093d3f2feaeda5bd6fde568ae1ce97bfc829d69f31b8d89edff798d4d624
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\Windows\\MSDCSC\\msdcsc.exe" cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe -
Modifies firewall policy service 2 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe -
Modifies security service 2 TTPs 1 IoCs
Processes:
msdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe -
Disables RegEdit via registry modification
-
Disables Task Manager via registry modification
-
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 288 msdcsc.exe -
Processes:
resource yara_rule \Windows\MSDCSC\msdcsc.exe upx \Windows\MSDCSC\msdcsc.exe upx C:\Windows\MSDCSC\msdcsc.exe upx -
Loads dropped DLL 2 IoCs
Processes:
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exepid process 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\UpdatesDisableNotify = "1" msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\Windows\\MSDCSC\\msdcsc.exe" cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe -
Drops file in Windows directory 3 IoCs
Processes:
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exedescription ioc process File created C:\Windows\MSDCSC\msdcsc.exe cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe File opened for modification C:\Windows\MSDCSC\msdcsc.exe cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe File opened for modification C:\Windows\MSDCSC\ cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
msdcsc.exepid process 288 msdcsc.exe -
Suspicious use of AdjustPrivilegeToken 46 IoCs
Processes:
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exemsdcsc.exedescription pid process Token: SeIncreaseQuotaPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeSecurityPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeTakeOwnershipPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeLoadDriverPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeSystemProfilePrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeSystemtimePrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeProfSingleProcessPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeIncBasePriorityPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeCreatePagefilePrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeBackupPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeRestorePrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeShutdownPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeDebugPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeSystemEnvironmentPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeChangeNotifyPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeRemoteShutdownPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeUndockPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeManageVolumePrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeImpersonatePrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeCreateGlobalPrivilege 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: 33 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: 34 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: 35 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe Token: SeIncreaseQuotaPrivilege 288 msdcsc.exe Token: SeSecurityPrivilege 288 msdcsc.exe Token: SeTakeOwnershipPrivilege 288 msdcsc.exe Token: SeLoadDriverPrivilege 288 msdcsc.exe Token: SeSystemProfilePrivilege 288 msdcsc.exe Token: SeSystemtimePrivilege 288 msdcsc.exe Token: SeProfSingleProcessPrivilege 288 msdcsc.exe Token: SeIncBasePriorityPrivilege 288 msdcsc.exe Token: SeCreatePagefilePrivilege 288 msdcsc.exe Token: SeBackupPrivilege 288 msdcsc.exe Token: SeRestorePrivilege 288 msdcsc.exe Token: SeShutdownPrivilege 288 msdcsc.exe Token: SeDebugPrivilege 288 msdcsc.exe Token: SeSystemEnvironmentPrivilege 288 msdcsc.exe Token: SeChangeNotifyPrivilege 288 msdcsc.exe Token: SeRemoteShutdownPrivilege 288 msdcsc.exe Token: SeUndockPrivilege 288 msdcsc.exe Token: SeManageVolumePrivilege 288 msdcsc.exe Token: SeImpersonatePrivilege 288 msdcsc.exe Token: SeCreateGlobalPrivilege 288 msdcsc.exe Token: 33 288 msdcsc.exe Token: 34 288 msdcsc.exe Token: 35 288 msdcsc.exe -
Suspicious use of WriteProcessMemory 43 IoCs
Processes:
cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.execmd.execmd.exemsdcsc.exedescription pid process target process PID 1088 wrote to memory of 1408 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1408 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1408 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1408 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1136 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1136 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1136 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1088 wrote to memory of 1136 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe cmd.exe PID 1136 wrote to memory of 1636 1136 cmd.exe attrib.exe PID 1136 wrote to memory of 1636 1136 cmd.exe attrib.exe PID 1136 wrote to memory of 1636 1136 cmd.exe attrib.exe PID 1136 wrote to memory of 1636 1136 cmd.exe attrib.exe PID 1408 wrote to memory of 1600 1408 cmd.exe attrib.exe PID 1408 wrote to memory of 1600 1408 cmd.exe attrib.exe PID 1408 wrote to memory of 1600 1408 cmd.exe attrib.exe PID 1408 wrote to memory of 1600 1408 cmd.exe attrib.exe PID 1088 wrote to memory of 288 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe msdcsc.exe PID 1088 wrote to memory of 288 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe msdcsc.exe PID 1088 wrote to memory of 288 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe msdcsc.exe PID 1088 wrote to memory of 288 1088 cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe msdcsc.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe PID 288 wrote to memory of 528 288 msdcsc.exe notepad.exe -
System policy modification 1 TTPs 3 IoCs
Processes:
msdcsc.exedescription ioc process Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion msdcsc.exe Key created \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern msdcsc.exe Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\CurrentVersion\Explorern\NoControlPanel = "1" msdcsc.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 1636 attrib.exe 1600 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe"C:\Users\Admin\AppData\Local\Temp\cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe"1⤵
- Modifies WinLogon for persistence
- Loads dropped DLL
- Adds Run key to start application
- Drops file in Windows directory
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp\cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:1408 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp\cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81.exe" +s +h3⤵
- Views/modifies file attributes
PID:1600
-
-
-
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /k attrib "C:\Users\Admin\AppData\Local\Temp" +s +h2⤵
- Suspicious use of WriteProcessMemory
PID:1136 -
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Views/modifies file attributes
PID:1636
-
-
-
C:\Windows\MSDCSC\msdcsc.exe"C:\Windows\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
- System policy modification
PID:288 -
C:\Windows\SysWOW64\notepad.exenotepad3⤵PID:528
-
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
MD5
a4166b3570c3c1165c68c7ceb9aa8c65
SHA16f8637d1f10743a9e43abe646b44b7bb63abc1e7
SHA256cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81
SHA5121953a35d3d6174aee555ffee66070ac02799f1410f7ced6692e3856b1b42e5cf5db4093d3f2feaeda5bd6fde568ae1ce97bfc829d69f31b8d89edff798d4d624
-
MD5
a4166b3570c3c1165c68c7ceb9aa8c65
SHA16f8637d1f10743a9e43abe646b44b7bb63abc1e7
SHA256cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81
SHA5121953a35d3d6174aee555ffee66070ac02799f1410f7ced6692e3856b1b42e5cf5db4093d3f2feaeda5bd6fde568ae1ce97bfc829d69f31b8d89edff798d4d624
-
MD5
a4166b3570c3c1165c68c7ceb9aa8c65
SHA16f8637d1f10743a9e43abe646b44b7bb63abc1e7
SHA256cff9df67e143e90b061018071340e97fcc6a96807ca79ef0c980c3aa0dec8c81
SHA5121953a35d3d6174aee555ffee66070ac02799f1410f7ced6692e3856b1b42e5cf5db4093d3f2feaeda5bd6fde568ae1ce97bfc829d69f31b8d89edff798d4d624