Analysis

  • max time kernel
    150s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v20210410
  • submitted
    25-06-2021 11:02

General

  • Target

    lab_02_win10x64/a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • Adds Run key to start application 2 TTPs 3 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 2 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe
    "C:\Windows\SystemApps\ShellExperienceHost_cw5n1h2txyewy\ShellExperienceHost.exe" -ServerName:App.AppXtk181tbxbce2qsex02s8tw7hfxa9xb3t.mca
    1⤵
      PID:3356
    • C:\Windows\system32\DllHost.exe
      C:\Windows\system32\DllHost.exe /Processid:{3EB3C877-1F16-487C-9050-104DBCD66683}
      1⤵
        PID:3836
      • C:\Windows\System32\RuntimeBroker.exe
        C:\Windows\System32\RuntimeBroker.exe -Embedding
        1⤵
          PID:3580
        • C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe
          "C:\Windows\SystemApps\Microsoft.Windows.Cortana_cw5n1h2txyewy\SearchUI.exe" -ServerName:CortanaUI.AppXa50dqqa5gqv4a428c9y1jjw7m3btvepj.mca
          1⤵
            PID:3368
          • C:\Windows\Explorer.EXE
            C:\Windows\Explorer.EXE
            1⤵
              PID:2764
              • C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
                "C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"
                2⤵
                • Suspicious use of SetThreadContext
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:4044
                • C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe
                  "C:\Users\Admin\AppData\Local\Temp\lab_02_win10x64\a380617cf945ca35dbbc3d031bcc612f0dca96c1027a75003182ba5be2851215.exe"
                  3⤵
                  • Suspicious use of AdjustPrivilegeToken
                  • Suspicious use of WriteProcessMemory
                  PID:188
                  • C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe
                    "C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe"
                    4⤵
                    • Executes dropped EXE
                    • Suspicious use of SetThreadContext
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:660
                    • C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe
                      "C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe"
                      5⤵
                      • Executes dropped EXE
                      • Adds Run key to start application
                      • Suspicious behavior: EnumeratesProcesses
                      • Suspicious use of WriteProcessMemory
                      PID:1116
                  • C:\Windows\SysWOW64\cmd.exe
                    "C:\Windows\system32\cmd.exe" /c "C:\Users\Admin\AppData\Local\Temp\tmpf5357bc0.bat"
                    4⤵
                      PID:1872
                      • C:\Windows\System32\Conhost.exe
                        \??\C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
                        5⤵
                          PID:3748
                • c:\windows\system32\taskhostw.exe
                  taskhostw.exe {222A245B-E637-4AE9-A93F-A59CA119A75E}
                  1⤵
                    PID:2704
                  • c:\windows\system32\sihost.exe
                    sihost.exe
                    1⤵
                      PID:2460
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k unistacksvcgroup -s CDPUserSvc
                      1⤵
                        PID:2436

                      Network

                      MITRE ATT&CK Enterprise v6

                      Replay Monitor

                      Loading Replay Monitor...

                      Downloads

                      • C:\Users\Admin\AppData\Local\Temp\tmpf5357bc0.bat

                        MD5

                        45a9a3d63951dee6715b88211fee852b

                        SHA1

                        0de965b7daf6220857bc25cbc858159e0b0368ce

                        SHA256

                        bb3a3e89dcfff19e875db4c2d1e5c4d315d3539db3270c60ddd9e46fe65c6f8f

                        SHA512

                        a3930704b5dddde601989e9e62f7057a4a4a3d6b851912e44949f84d93fc56e1dfa1ee9bd40ce59539a82de793033a6b2517e880ed09c60359fcf497164b0bed

                      • C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe

                        MD5

                        a8bf719a32ea1e65d8067e165d9e5bb8

                        SHA1

                        dc4efc0fc0ef9b54df5c96ca2640564fd71ed17a

                        SHA256

                        2b94ae9b3b3db2aa2f015a9d37a5b5d9b7eeb9d35687fe6c97f12fef302ab637

                        SHA512

                        0b428243570a7db271e7c1c3f2d9777ac14d3b5dd1f9957eacb6df49555b95f0f1daa324b1a66851cdd0476adcd7352cd405d2829b9fe01bd52717f09aff0bb8

                      • C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe

                        MD5

                        a8bf719a32ea1e65d8067e165d9e5bb8

                        SHA1

                        dc4efc0fc0ef9b54df5c96ca2640564fd71ed17a

                        SHA256

                        2b94ae9b3b3db2aa2f015a9d37a5b5d9b7eeb9d35687fe6c97f12fef302ab637

                        SHA512

                        0b428243570a7db271e7c1c3f2d9777ac14d3b5dd1f9957eacb6df49555b95f0f1daa324b1a66851cdd0476adcd7352cd405d2829b9fe01bd52717f09aff0bb8

                      • C:\Users\Admin\AppData\Roaming\Aqgoqu\cisyt.exe

                        MD5

                        a8bf719a32ea1e65d8067e165d9e5bb8

                        SHA1

                        dc4efc0fc0ef9b54df5c96ca2640564fd71ed17a

                        SHA256

                        2b94ae9b3b3db2aa2f015a9d37a5b5d9b7eeb9d35687fe6c97f12fef302ab637

                        SHA512

                        0b428243570a7db271e7c1c3f2d9777ac14d3b5dd1f9957eacb6df49555b95f0f1daa324b1a66851cdd0476adcd7352cd405d2829b9fe01bd52717f09aff0bb8

                      • memory/188-117-0x0000000000400000-0x000000000043B000-memory.dmp

                        Filesize

                        236KB

                      • memory/188-118-0x000000000042B055-mapping.dmp

                      • memory/188-119-0x0000000000400000-0x000000000043B000-memory.dmp

                        Filesize

                        236KB

                      • memory/660-120-0x0000000000000000-mapping.dmp

                      • memory/1116-127-0x000000000042B055-mapping.dmp

                      • memory/1872-129-0x0000000000000000-mapping.dmp

                      • memory/1872-132-0x0000000003120000-0x000000000315B000-memory.dmp

                        Filesize

                        236KB

                      • memory/4044-116-0x00000000020F0000-0x0000000002110000-memory.dmp

                        Filesize

                        128KB