Analysis
-
max time kernel
142s -
max time network
144s -
platform
windows7_x64 -
resource
win7v20210410 -
submitted
16-05-2021 06:05
Static task
static1
Behavioral task
behavioral1
Sample
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe
Resource
win7v20210410
Behavioral task
behavioral2
Sample
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe
Resource
win10v20210408
General
-
Target
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe
-
Size
821KB
-
MD5
d9b36a4b92a93b667270722827c7d303
-
SHA1
cfaec9d1e7557c483a3415fb4496735c6da181dc
-
SHA256
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099
-
SHA512
11299d1e2388e7132e47dfb2b72cc1a98a92ecb29500082c763f237f2f4f023fb650af7901e6402889fd9a014e55cd4d30464740839f53cdd05f85a65a1ff665
Malware Config
Signatures
-
Modifies WinLogon for persistence 2 TTPs 1 IoCs
Processes:
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows NT\CurrentVersion\Winlogon\UserInit = "C:\\Windows\\system32\\userinit.exe,C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe -
Modifies firewall policy service 2 TTPs 6 IoCs
Processes:
iexplore.exemsdcsc.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" iexplore.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" iexplore.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\EnableFirewall = "0" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile\DisableNotifications = "0" msdcsc.exe Key created \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\SharedAccess\Parameters\FirewallPolicy\StandardProfile iexplore.exe -
Modifies security service 2 TTPs 2 IoCs
Processes:
msdcsc.exeiexplore.exedescription ioc process Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" msdcsc.exe Set value (int) \REGISTRY\MACHINE\SYSTEM\ControlSet001\services\wscsvc\Start = "4" iexplore.exe -
Drops file in Drivers directory 1 IoCs
Processes:
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exedescription ioc process File opened for modification C:\Windows\system32\drivers\etc\hosts 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe -
Executes dropped EXE 1 IoCs
Processes:
msdcsc.exepid process 548 msdcsc.exe -
Loads dropped DLL 2 IoCs
Processes:
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exepid process 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe -
Processes:
msdcsc.exedescription ioc process Set value (str) \REGISTRY\MACHINE\SOFTWARE\Wow6432Node\Microsoft\Security Center\AntiVirusDisableNotify = "1" msdcsc.exe -
Adds Run key to start application 2 TTPs 1 IoCs
Processes:
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-2513283230-931923277-594887482-1000\Software\Microsoft\Windows\CurrentVersion\Run\MicroUpdate = "C:\\ProgramData\\Microsoft\\Windows\\Start Menu\\MSDCSC\\msdcsc.exe" 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe -
Suspicious use of SetThreadContext 1 IoCs
Processes:
msdcsc.exedescription pid process target process PID 548 set thread context of 1248 548 msdcsc.exe iexplore.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
Processes:
iexplore.exepid process 1248 iexplore.exe -
Suspicious use of AdjustPrivilegeToken 64 IoCs
Processes:
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exemsdcsc.exeiexplore.exedescription pid process Token: SeIncreaseQuotaPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeSecurityPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeTakeOwnershipPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeLoadDriverPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeSystemProfilePrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeSystemtimePrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeProfSingleProcessPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeIncBasePriorityPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeCreatePagefilePrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeBackupPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeRestorePrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeShutdownPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeDebugPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeSystemEnvironmentPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeChangeNotifyPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeRemoteShutdownPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeUndockPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeManageVolumePrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeImpersonatePrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeCreateGlobalPrivilege 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: 33 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: 34 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: 35 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe Token: SeIncreaseQuotaPrivilege 548 msdcsc.exe Token: SeSecurityPrivilege 548 msdcsc.exe Token: SeTakeOwnershipPrivilege 548 msdcsc.exe Token: SeLoadDriverPrivilege 548 msdcsc.exe Token: SeSystemProfilePrivilege 548 msdcsc.exe Token: SeSystemtimePrivilege 548 msdcsc.exe Token: SeProfSingleProcessPrivilege 548 msdcsc.exe Token: SeIncBasePriorityPrivilege 548 msdcsc.exe Token: SeCreatePagefilePrivilege 548 msdcsc.exe Token: SeBackupPrivilege 548 msdcsc.exe Token: SeRestorePrivilege 548 msdcsc.exe Token: SeShutdownPrivilege 548 msdcsc.exe Token: SeDebugPrivilege 548 msdcsc.exe Token: SeSystemEnvironmentPrivilege 548 msdcsc.exe Token: SeChangeNotifyPrivilege 548 msdcsc.exe Token: SeRemoteShutdownPrivilege 548 msdcsc.exe Token: SeUndockPrivilege 548 msdcsc.exe Token: SeManageVolumePrivilege 548 msdcsc.exe Token: SeImpersonatePrivilege 548 msdcsc.exe Token: SeCreateGlobalPrivilege 548 msdcsc.exe Token: 33 548 msdcsc.exe Token: 34 548 msdcsc.exe Token: 35 548 msdcsc.exe Token: SeIncreaseQuotaPrivilege 1248 iexplore.exe Token: SeSecurityPrivilege 1248 iexplore.exe Token: SeTakeOwnershipPrivilege 1248 iexplore.exe Token: SeLoadDriverPrivilege 1248 iexplore.exe Token: SeSystemProfilePrivilege 1248 iexplore.exe Token: SeSystemtimePrivilege 1248 iexplore.exe Token: SeProfSingleProcessPrivilege 1248 iexplore.exe Token: SeIncBasePriorityPrivilege 1248 iexplore.exe Token: SeCreatePagefilePrivilege 1248 iexplore.exe Token: SeBackupPrivilege 1248 iexplore.exe Token: SeRestorePrivilege 1248 iexplore.exe Token: SeShutdownPrivilege 1248 iexplore.exe Token: SeDebugPrivilege 1248 iexplore.exe Token: SeSystemEnvironmentPrivilege 1248 iexplore.exe Token: SeChangeNotifyPrivilege 1248 iexplore.exe Token: SeRemoteShutdownPrivilege 1248 iexplore.exe Token: SeUndockPrivilege 1248 iexplore.exe Token: SeManageVolumePrivilege 1248 iexplore.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
Processes:
iexplore.exepid process 1248 iexplore.exe -
Suspicious use of WriteProcessMemory 26 IoCs
Processes:
491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.execmd.execmd.exemsdcsc.exedescription pid process target process PID 1100 wrote to memory of 1584 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1584 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1584 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1584 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1636 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1636 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1636 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1100 wrote to memory of 1636 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe cmd.exe PID 1584 wrote to memory of 644 1584 cmd.exe attrib.exe PID 1584 wrote to memory of 644 1584 cmd.exe attrib.exe PID 1584 wrote to memory of 644 1584 cmd.exe attrib.exe PID 1584 wrote to memory of 644 1584 cmd.exe attrib.exe PID 1636 wrote to memory of 284 1636 cmd.exe attrib.exe PID 1636 wrote to memory of 284 1636 cmd.exe attrib.exe PID 1636 wrote to memory of 284 1636 cmd.exe attrib.exe PID 1636 wrote to memory of 284 1636 cmd.exe attrib.exe PID 1100 wrote to memory of 548 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe msdcsc.exe PID 1100 wrote to memory of 548 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe msdcsc.exe PID 1100 wrote to memory of 548 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe msdcsc.exe PID 1100 wrote to memory of 548 1100 491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe msdcsc.exe PID 548 wrote to memory of 1248 548 msdcsc.exe iexplore.exe PID 548 wrote to memory of 1248 548 msdcsc.exe iexplore.exe PID 548 wrote to memory of 1248 548 msdcsc.exe iexplore.exe PID 548 wrote to memory of 1248 548 msdcsc.exe iexplore.exe PID 548 wrote to memory of 1248 548 msdcsc.exe iexplore.exe PID 548 wrote to memory of 1248 548 msdcsc.exe iexplore.exe -
Views/modifies file attributes 1 TTPs 2 IoCs
Processes:
attrib.exeattrib.exepid process 284 attrib.exe 644 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe"C:\Users\Admin\AppData\Local\Temp\491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099.exe"1⤵
- Modifies WinLogon for persistence
- Drops file in Drivers directory
- Loads dropped DLL
- Adds Run key to start application
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Views/modifies file attributes
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\tmpcmd.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\attrib.exeattrib "C:\Users\Admin\AppData\Local\Temp" +s +h3⤵
- Views/modifies file attributes
-
C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exe"2⤵
- Modifies firewall policy service
- Modifies security service
- Executes dropped EXE
- Windows security modification
- Suspicious use of SetThreadContext
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of WriteProcessMemory
-
C:\Program Files (x86)\Internet Explorer\iexplore.exe"C:\Program Files (x86)\Internet Explorer\iexplore.exe"3⤵
- Modifies firewall policy service
- Modifies security service
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exeMD5
d9b36a4b92a93b667270722827c7d303
SHA1cfaec9d1e7557c483a3415fb4496735c6da181dc
SHA256491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099
SHA51211299d1e2388e7132e47dfb2b72cc1a98a92ecb29500082c763f237f2f4f023fb650af7901e6402889fd9a014e55cd4d30464740839f53cdd05f85a65a1ff665
-
C:\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exeMD5
d9b36a4b92a93b667270722827c7d303
SHA1cfaec9d1e7557c483a3415fb4496735c6da181dc
SHA256491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099
SHA51211299d1e2388e7132e47dfb2b72cc1a98a92ecb29500082c763f237f2f4f023fb650af7901e6402889fd9a014e55cd4d30464740839f53cdd05f85a65a1ff665
-
C:\Users\Admin\AppData\Local\Temp\tmpcmd.batMD5
b774ae3fb1da087e1f83b4f7b2060e5a
SHA197eb9be49ac3af9c851c9e1e84e32bfd53e325a8
SHA256adaf4a84b41e410b02e261cfd0fe7739d98647eab73c3badd32ac6e39f26351b
SHA512f75d0f95f7306d26a12b414bfe37b97fbd37546cb3c6e403def7077329ddffb4b45d5c5f0ba0e7bb6d72851d2d691b0a85267beead42f7cbf2e8c3d45a3b4701
-
\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exeMD5
d9b36a4b92a93b667270722827c7d303
SHA1cfaec9d1e7557c483a3415fb4496735c6da181dc
SHA256491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099
SHA51211299d1e2388e7132e47dfb2b72cc1a98a92ecb29500082c763f237f2f4f023fb650af7901e6402889fd9a014e55cd4d30464740839f53cdd05f85a65a1ff665
-
\ProgramData\Microsoft\Windows\Start Menu\MSDCSC\msdcsc.exeMD5
d9b36a4b92a93b667270722827c7d303
SHA1cfaec9d1e7557c483a3415fb4496735c6da181dc
SHA256491544e52e7cc8c4260647abcb38138c21e34406d4e553936c5e1be8931c0099
SHA51211299d1e2388e7132e47dfb2b72cc1a98a92ecb29500082c763f237f2f4f023fb650af7901e6402889fd9a014e55cd4d30464740839f53cdd05f85a65a1ff665
-
memory/284-66-0x0000000000000000-mapping.dmp
-
memory/548-75-0x0000000000240000-0x0000000000241000-memory.dmpFilesize
4KB
-
memory/548-69-0x0000000000000000-mapping.dmp
-
memory/644-65-0x0000000000000000-mapping.dmp
-
memory/1100-60-0x00000000757D1000-0x00000000757D3000-memory.dmpFilesize
8KB
-
memory/1100-61-0x0000000000280000-0x0000000000281000-memory.dmpFilesize
4KB
-
memory/1248-73-0x0000000000400000-0x00000000004DB000-memory.dmpFilesize
876KB
-
memory/1248-74-0x000000000049F92C-mapping.dmp
-
memory/1584-62-0x0000000000000000-mapping.dmp
-
memory/1636-63-0x0000000000000000-mapping.dmp