Resubmissions

07-06-2021 10:08

210607-9hpr7n82ba 10

03-06-2021 20:20

210603-mpsat3rm4j 10

Analysis

  • max time kernel
    30s
  • max time network
    31s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    07-06-2021 10:08

General

  • Target

    gVcWDWENI8.exe

  • Size

    142KB

  • MD5

    e1f063d63a75e0e0e864052b1a50ab06

  • SHA1

    75d941a28cf0ade2ef2c16dfacbdeb36a51ccaf7

  • SHA256

    8c723af5c826adea162ef3f2e37a1cca7b43d549c9a5fab7c9ff17f65eb5d8e7

  • SHA512

    25681b210ee18bd60ba3fef496769283d51dc516569e1f1834d6d23a5927c1684b25ff67baf5fba66c908b364a13784f49facdde7a98b2fb8a8a41a2ec792ae3

Score
8/10

Malware Config

Signatures

  • Modifies Windows Firewall 1 TTPs
  • Launches sc.exe

    Sc.exe is a Windows utlilty to control services on the system.

  • Kills process with taskkill 48 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 49 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • System policy modification 1 TTPs 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\gVcWDWENI8.exe
    "C:\Users\Admin\AppData\Local\Temp\gVcWDWENI8.exe"
    1⤵
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    • System policy modification
    PID:2232
    • C:\Windows\SYSTEM32\taskkill.exe
      "taskkill" /F /IM RaccineSettings.exe
      2⤵
      • Kills process with taskkill
      • Suspicious use of AdjustPrivilegeToken
      PID:3940
    • C:\Windows\SYSTEM32\reg.exe
      "reg" delete "HKCU\SOFTWARE\Microsoft\Windows\CurrentVersion\Run" /V "Raccine Tray" /F
      2⤵
        PID:1324
      • C:\Windows\SYSTEM32\reg.exe
        "reg" delete HKCU\Software\Raccine /F
        2⤵
        • Modifies registry key
        PID:3516
      • C:\Windows\SYSTEM32\schtasks.exe
        "schtasks" /DELETE /TN "Raccine Rules Updater" /F
        2⤵
          PID:3772
        • C:\Windows\SYSTEM32\sc.exe
          "sc.exe" config Dnscache start= auto
          2⤵
            PID:3176
          • C:\Windows\SYSTEM32\sc.exe
            "sc.exe" config FDResPub start= auto
            2⤵
              PID:3160
            • C:\Windows\SYSTEM32\sc.exe
              "sc.exe" config SQLTELEMETRY start= disabled
              2⤵
                PID:3364
              • C:\Windows\SYSTEM32\netsh.exe
                "netsh" advfirewall firewall set rule group=\"Network Discovery\" new enable=Yes
                2⤵
                  PID:1348
                • C:\Windows\SYSTEM32\sc.exe
                  "sc.exe" config SSDPSRV start= auto
                  2⤵
                    PID:1796
                  • C:\Windows\SYSTEM32\sc.exe
                    "sc.exe" config SstpSvc start= disabled
                    2⤵
                      PID:3700
                    • C:\Windows\SYSTEM32\sc.exe
                      "sc.exe" config SQLTELEMETRY$ECWDB2 start= disabled
                      2⤵
                        PID:2768
                      • C:\Windows\SYSTEM32\sc.exe
                        "sc.exe" config upnphost start= auto
                        2⤵
                          PID:372
                        • C:\Windows\SYSTEM32\sc.exe
                          "sc.exe" config SQLWriter start= disabled
                          2⤵
                            PID:3916
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3564
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mspub.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1340
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM synctime.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2076
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM Ntrtscan.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2664
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mydesktopqos.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3464
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mysqld.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3132
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM isqlplussvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:4076
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM sqbcoreservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1144
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM mydesktopservice.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3972
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM onenote.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3560
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM firefoxconfig.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:2176
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM encsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            PID:2152
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM PccNTMon.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1916
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM excel.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:1520
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM agntsvc.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3520
                          • C:\Windows\SYSTEM32\taskkill.exe
                            "taskkill.exe" /IM dbeng50.exe /F
                            2⤵
                            • Kills process with taskkill
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3396
                          • C:\Windows\SYSTEM32\netsh.exe
                            "netsh" advfirewall firewall set rule group=\"File and Printer Sharing\" new enable=Yes
                            2⤵
                              PID:1872
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM msaccess.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2356
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM CNTAoSMgr.exe /F
                              2⤵
                              • Kills process with taskkill
                              PID:3968
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM outlook.exe /F
                              2⤵
                              • Kills process with taskkill
                              PID:3960
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM thebat.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2260
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM thebat64.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1668
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM sqlwriter.exe /F
                              2⤵
                              • Kills process with taskkill
                              PID:4052
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM tmlisten.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:1320
                            • C:\Windows\SYSTEM32\taskkill.exe
                              "taskkill.exe" /IM steam.exe /F
                              2⤵
                              • Kills process with taskkill
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3112
                            • C:\Windows\SYSTEM32\arp.exe
                              "arp" -a
                              2⤵
                                PID:2732
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM tbirdconfig.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2720
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM ocomm.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2144
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" IM thunderbird.exe /F
                                2⤵
                                • Kills process with taskkill
                                PID:3140
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM msftesql.exe /F
                                2⤵
                                • Kills process with taskkill
                                PID:3832
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM dbsnmp.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2688
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM wordpad.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3288
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM infopath.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1892
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM powerpnt.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1680
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM xfssvccon.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2080
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM mbamtray.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3192
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM mysqld-opt.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3116
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM mydesktopqos.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1572
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM ocautoupds.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3136
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM zoolz.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:376
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM visio.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1820
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM ocssd.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2248
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM mydesktopservice.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3968
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM oracle.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2152
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:4052
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM winword.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1348
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3832
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM sqlagent.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3516
                                • C:\Windows\System32\Conhost.exe
                                  \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                                  3⤵
                                  • Suspicious use of AdjustPrivilegeToken
                                  PID:3960
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM mysqld-nt.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:3964
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM sqlbrowser.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1468
                              • C:\Windows\SYSTEM32\taskkill.exe
                                "taskkill.exe" /IM sqlservr.exe /F
                                2⤵
                                • Kills process with taskkill
                                • Suspicious use of AdjustPrivilegeToken
                                PID:1524
                              • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                                "powershell.exe" & Get-WmiObject Win32_Shadowcopy | ForEach-Object { $_Delete(); }
                                2⤵
                                • Suspicious use of AdjustPrivilegeToken
                                PID:2728
                              • C:\Windows\SYSTEM32\cmd.exe
                                "cmd.exe" /c rd /s /q %SYSTEMDRIVE%\\$Recycle.bin
                                2⤵
                                  PID:3632

                              Network

                              MITRE ATT&CK Enterprise v6

                              Replay Monitor

                              Loading Replay Monitor...

                              Downloads

                              • memory/372-128-0x0000000000000000-mapping.dmp

                              • memory/376-169-0x0000000000000000-mapping.dmp

                              • memory/1144-137-0x0000000000000000-mapping.dmp

                              • memory/1320-153-0x0000000000000000-mapping.dmp

                              • memory/1324-118-0x0000000000000000-mapping.dmp

                              • memory/1340-131-0x0000000000000000-mapping.dmp

                              • memory/1348-174-0x0000000000000000-mapping.dmp

                              • memory/1348-123-0x0000000000000000-mapping.dmp

                              • memory/1468-177-0x0000000000000000-mapping.dmp

                              • memory/1520-143-0x0000000000000000-mapping.dmp

                              • memory/1524-178-0x0000000000000000-mapping.dmp

                              • memory/1572-167-0x0000000000000000-mapping.dmp

                              • memory/1668-151-0x0000000000000000-mapping.dmp

                              • memory/1680-163-0x0000000000000000-mapping.dmp

                              • memory/1796-125-0x0000000000000000-mapping.dmp

                              • memory/1820-170-0x0000000000000000-mapping.dmp

                              • memory/1872-146-0x0000000000000000-mapping.dmp

                              • memory/1892-162-0x0000000000000000-mapping.dmp

                              • memory/1916-142-0x0000000000000000-mapping.dmp

                              • memory/2076-132-0x0000000000000000-mapping.dmp

                              • memory/2080-164-0x0000000000000000-mapping.dmp

                              • memory/2144-157-0x0000000000000000-mapping.dmp

                              • memory/2152-173-0x0000000000000000-mapping.dmp

                              • memory/2152-141-0x0000000000000000-mapping.dmp

                              • memory/2176-140-0x0000000000000000-mapping.dmp

                              • memory/2232-116-0x000000001B7A0000-0x000000001B7A2000-memory.dmp

                                Filesize

                                8KB

                              • memory/2232-114-0x0000000000B40000-0x0000000000B41000-memory.dmp

                                Filesize

                                4KB

                              • memory/2248-171-0x0000000000000000-mapping.dmp

                              • memory/2260-150-0x0000000000000000-mapping.dmp

                              • memory/2356-147-0x0000000000000000-mapping.dmp

                              • memory/2664-133-0x0000000000000000-mapping.dmp

                              • memory/2688-160-0x0000000000000000-mapping.dmp

                              • memory/2720-156-0x0000000000000000-mapping.dmp

                              • memory/2728-187-0x00000229EB860000-0x00000229EB861000-memory.dmp

                                Filesize

                                4KB

                              • memory/2728-189-0x00000229EB6D3000-0x00000229EB6D5000-memory.dmp

                                Filesize

                                8KB

                              • memory/2728-188-0x00000229EB6D0000-0x00000229EB6D2000-memory.dmp

                                Filesize

                                8KB

                              • memory/2728-201-0x00000229EB6D6000-0x00000229EB6D8000-memory.dmp

                                Filesize

                                8KB

                              • memory/2728-184-0x00000229EB690000-0x00000229EB691000-memory.dmp

                                Filesize

                                4KB

                              • memory/2728-179-0x0000000000000000-mapping.dmp

                              • memory/2732-155-0x0000000000000000-mapping.dmp

                              • memory/2768-126-0x0000000000000000-mapping.dmp

                              • memory/3112-154-0x0000000000000000-mapping.dmp

                              • memory/3116-166-0x0000000000000000-mapping.dmp

                              • memory/3132-135-0x0000000000000000-mapping.dmp

                              • memory/3136-168-0x0000000000000000-mapping.dmp

                              • memory/3140-158-0x0000000000000000-mapping.dmp

                              • memory/3160-122-0x0000000000000000-mapping.dmp

                              • memory/3176-121-0x0000000000000000-mapping.dmp

                              • memory/3192-165-0x0000000000000000-mapping.dmp

                              • memory/3288-161-0x0000000000000000-mapping.dmp

                              • memory/3364-124-0x0000000000000000-mapping.dmp

                              • memory/3396-145-0x0000000000000000-mapping.dmp

                              • memory/3464-134-0x0000000000000000-mapping.dmp

                              • memory/3516-175-0x0000000000000000-mapping.dmp

                              • memory/3516-119-0x0000000000000000-mapping.dmp

                              • memory/3520-144-0x0000000000000000-mapping.dmp

                              • memory/3560-139-0x0000000000000000-mapping.dmp

                              • memory/3564-130-0x0000000000000000-mapping.dmp

                              • memory/3632-202-0x0000000000000000-mapping.dmp

                              • memory/3700-127-0x0000000000000000-mapping.dmp

                              • memory/3772-120-0x0000000000000000-mapping.dmp

                              • memory/3832-159-0x0000000000000000-mapping.dmp

                              • memory/3916-129-0x0000000000000000-mapping.dmp

                              • memory/3940-117-0x0000000000000000-mapping.dmp

                              • memory/3960-149-0x0000000000000000-mapping.dmp

                              • memory/3964-176-0x0000000000000000-mapping.dmp

                              • memory/3968-172-0x0000000000000000-mapping.dmp

                              • memory/3968-148-0x0000000000000000-mapping.dmp

                              • memory/3972-138-0x0000000000000000-mapping.dmp

                              • memory/4052-152-0x0000000000000000-mapping.dmp

                              • memory/4076-136-0x0000000000000000-mapping.dmp