Analysis

  • max time kernel
    297s
  • max time network
    285s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    25-06-2021 09:58

General

  • Target

    lab_02_win10x64/b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 2 IoCs
  • Looks up external IP address via web service 5 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 6 IoCs
  • Modifies data under HKEY_USERS 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe
    "C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
      C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
      2⤵
      • Executes dropped EXE
      • Suspicious use of WriteProcessMemory
      PID:1680
      • C:\Windows\system32\svchost.exe
        svchost.exe -k netsvcs
        3⤵
          PID:524
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {8ACFAC5C-4F8F-48CD-8614-F42EFA614F57} S-1-5-18:NT AUTHORITY\System:Service:
      1⤵
        PID:620
        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          2⤵
          • Executes dropped EXE
          PID:1912
          • C:\Windows\system32\svchost.exe
            svchost.exe -k netsvcs
            3⤵
            • Drops file in System32 directory
            • Modifies data under HKEY_USERS
            PID:528
        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          2⤵
          • Executes dropped EXE
          PID:896
          • C:\Windows\system32\svchost.exe
            svchost.exe -k netsvcs
            3⤵
              PID:944
          • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
            C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
            2⤵
            • Executes dropped EXE
            PID:1208
            • C:\Windows\system32\svchost.exe
              svchost.exe -k netsvcs
              3⤵
              • Modifies data under HKEY_USERS
              PID:1636
          • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
            C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
            2⤵
            • Executes dropped EXE
            PID:1212

        Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • C:\Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • C:\Users\Admin\AppData\Roaming\winapp\client_id
          MD5

          78148489fdf851177e225ea3eba47d4b

          SHA1

          f0172a677500cc1f57f1d938b81b2730942e5d32

          SHA256

          17886640cdd8c385741ec0986c5748a052919f9e7c6be6f16554aec9768fb87d

          SHA512

          16c7ba12bcbbae378450bb6f2d0a8e4c58cc1de46d6738f217a68edc89bdbe4086b37a0abe5cfd23d1768f2bbdb00ae540c9baf71627e82886089d31bcd3571b

        • \Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • \Users\Admin\AppData\Roaming\winapp\a2a2aa408cc23a822a0a8810ea804dbaa4bd21b23760a18a4712a4a0ec3c8eb6.exe
          MD5

          b3dc48d13f7d541fa583bf964c0603bf

          SHA1

          1dbaa68adc0a592508f7ad715bfcdf79c17990d6

          SHA256

          b3b3bb519dd34a933a0b9920fa905ecaa5ce32c34871a29b5823a5b0fd4d9fc7

          SHA512

          193bda0656a9d1be54dc655d9af3224ddccb78fc26aa77618fba1e3c36005a0368a200960cc28facc280df667f51a26bbef62282bbf8837cc036a41bfb8525f4

        • memory/524-77-0x0000000000000000-mapping.dmp
        • memory/524-85-0x0000000000060000-0x0000000000061000-memory.dmp
          Filesize

          4KB

        • memory/524-79-0x0000000140000000-0x0000000140023000-memory.dmp
          Filesize

          140KB

        • memory/528-98-0x0000000000000000-mapping.dmp
        • memory/896-107-0x0000000000000000-mapping.dmp
        • memory/896-126-0x0000000000290000-0x0000000000291000-memory.dmp
          Filesize

          4KB

        • memory/896-112-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/896-110-0x0000000000400000-0x00000000004AD000-memory.dmp
          Filesize

          692KB

        • memory/944-118-0x0000000000000000-mapping.dmp
        • memory/1208-146-0x00000000002A0000-0x00000000002A1000-memory.dmp
          Filesize

          4KB

        • memory/1208-133-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/1208-131-0x0000000000400000-0x00000000004AD000-memory.dmp
          Filesize

          692KB

        • memory/1208-128-0x0000000000000000-mapping.dmp
        • memory/1212-153-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/1212-151-0x0000000000400000-0x00000000004AD000-memory.dmp
          Filesize

          692KB

        • memory/1212-148-0x0000000000000000-mapping.dmp
        • memory/1636-139-0x0000000000000000-mapping.dmp
        • memory/1668-62-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/1668-63-0x0000000000260000-0x000000000029C000-memory.dmp
          Filesize

          240KB

        • memory/1668-61-0x00000000753B1000-0x00000000753B3000-memory.dmp
          Filesize

          8KB

        • memory/1668-60-0x0000000000400000-0x00000000004AD000-memory.dmp
          Filesize

          692KB

        • memory/1668-59-0x0000000000400000-0x0000000000440000-memory.dmp
          Filesize

          256KB

        • memory/1680-70-0x0000000000400000-0x00000000004AD000-memory.dmp
          Filesize

          692KB

        • memory/1680-84-0x0000000000350000-0x0000000000351000-memory.dmp
          Filesize

          4KB

        • memory/1680-74-0x0000000010000000-0x0000000010007000-memory.dmp
          Filesize

          28KB

        • memory/1680-68-0x0000000000320000-0x0000000000321000-memory.dmp
          Filesize

          4KB

        • memory/1680-66-0x0000000000000000-mapping.dmp
        • memory/1912-105-0x0000000000250000-0x0000000000251000-memory.dmp
          Filesize

          4KB

        • memory/1912-92-0x0000000000220000-0x0000000000221000-memory.dmp
          Filesize

          4KB

        • memory/1912-90-0x0000000000400000-0x00000000004AD000-memory.dmp
          Filesize

          692KB

        • memory/1912-87-0x0000000000000000-mapping.dmp