Analysis

  • max time kernel
    122s
  • max time network
    15s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    25-05-2021 06:20

General

  • Target

    BjHM6PDDCwG9GvC.exe

  • Size

    1.3MB

  • MD5

    58753a65f6bcaf7b06217d456bd3fa1a

  • SHA1

    5031df39b31c8ceb0ad15e80156a2349c2fd5ade

  • SHA256

    d4511fa399217b186b74d425d5a0857ae7fe394c9993d76f79beccf2ecea92e2

  • SHA512

    47ba296df03054cf97a865d24de2ec87e20c9865963cdafa4eee86736e1af1003463d2b0623467d70756d286f9917d31a4a2deb9d0d8c28e7ed345f0b015fd35

Score
9/10

Malware Config

Signatures

  • CustAttr .NET packer 1 IoCs

    Detects CustAttr .NET packer in memory.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 16 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 36 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
    "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:1888
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:856
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FcngqEfa.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:480
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /TN "Updates\FcngqEfa" /XML "C:\Users\Admin\AppData\Local\Temp\tmpD7F7.tmp"
      2⤵
      • Creates scheduled task(s)
      PID:1172
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\FcngqEfa.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1872
    • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
      "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
      2⤵
        PID:1092
      • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
        "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
        2⤵
          PID:1716
        • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
          "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
          2⤵
            PID:1088
          • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
            "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
            2⤵
              PID:1536
            • C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe
              "C:\Users\Admin\AppData\Local\Temp\BjHM6PDDCwG9GvC.exe"
              2⤵
                PID:1368

            Network

            MITRE ATT&CK Enterprise v6

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • memory/480-101-0x0000000006140000-0x0000000006141000-memory.dmp

              Filesize

              4KB

            • memory/480-134-0x0000000006310000-0x0000000006311000-memory.dmp

              Filesize

              4KB

            • memory/480-95-0x0000000005650000-0x0000000005651000-memory.dmp

              Filesize

              4KB

            • memory/480-100-0x00000000056B0000-0x00000000056B1000-memory.dmp

              Filesize

              4KB

            • memory/480-108-0x0000000006250000-0x0000000006251000-memory.dmp

              Filesize

              4KB

            • memory/480-90-0x00000000047E0000-0x00000000047E1000-memory.dmp

              Filesize

              4KB

            • memory/480-71-0x0000000000620000-0x0000000000621000-memory.dmp

              Filesize

              4KB

            • memory/480-133-0x00000000062C0000-0x00000000062C1000-memory.dmp

              Filesize

              4KB

            • memory/480-87-0x0000000004912000-0x0000000004913000-memory.dmp

              Filesize

              4KB

            • memory/480-124-0x000000007EF30000-0x000000007EF31000-memory.dmp

              Filesize

              4KB

            • memory/480-84-0x0000000004910000-0x0000000004911000-memory.dmp

              Filesize

              4KB

            • memory/480-116-0x0000000005610000-0x0000000005611000-memory.dmp

              Filesize

              4KB

            • memory/856-67-0x0000000075161000-0x0000000075163000-memory.dmp

              Filesize

              8KB

            • memory/856-86-0x00000000048F2000-0x00000000048F3000-memory.dmp

              Filesize

              4KB

            • memory/856-74-0x0000000004930000-0x0000000004931000-memory.dmp

              Filesize

              4KB

            • memory/856-85-0x00000000048F0000-0x00000000048F1000-memory.dmp

              Filesize

              4KB

            • memory/1872-88-0x00000000049A0000-0x00000000049A1000-memory.dmp

              Filesize

              4KB

            • memory/1872-89-0x00000000049A2000-0x00000000049A3000-memory.dmp

              Filesize

              4KB

            • memory/1872-81-0x0000000002680000-0x0000000002681000-memory.dmp

              Filesize

              4KB

            • memory/1888-60-0x00000000003E0000-0x00000000003E1000-memory.dmp

              Filesize

              4KB

            • memory/1888-65-0x0000000005690000-0x00000000057BF000-memory.dmp

              Filesize

              1.2MB

            • memory/1888-64-0x0000000005580000-0x000000000568D000-memory.dmp

              Filesize

              1.1MB

            • memory/1888-63-0x0000000000370000-0x0000000000375000-memory.dmp

              Filesize

              20KB

            • memory/1888-62-0x0000000004D30000-0x0000000004D31000-memory.dmp

              Filesize

              4KB