Analysis

  • max time kernel
    147s
  • max time network
    195s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    27-07-2021 10:56

General

  • Target

    Serfinanza_Extracto_3925684864088446202605_15411665189244361977_577131188431184261981_8054548415905136416878.exe

  • Size

    293KB

  • MD5

    f3ec2ac5f8cd8dfb46f3a4d14acc4c84

  • SHA1

    45cc84a525944b49a77bb693e2cc6f9e38e7d27c

  • SHA256

    de2346e7683a4ed34d62a2954a38949335e6c1b27085a1cc82c08b0c6aec514e

  • SHA512

    890a5881861259344ae46ac43edffaf86a203604175da1c85b6b5964c61b9dff7b68d7c5191689913ac9adb11332b7c085ac5ca317124bea309641e7a702cbc3

Malware Config

Signatures

  • Guloader,Cloudeye

    A shellcode based downloader first seen in 2020.

  • ModiLoader, DBatLoader

    ModiLoader is a Delphi loader that misuses cloud services to download other malicious families.

  • Remcos

    Remcos is a closed-source remote control and surveillance software.

  • UAC bypass 3 TTPs
  • Checks QEMU agent file 2 TTPs 2 IoCs

    Checks presence of QEMU agent, possibly to detect virtualization.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 3 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: MapViewOfSection 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\Serfinanza_Extracto_3925684864088446202605_15411665189244361977_577131188431184261981_8054548415905136416878.exe
    "C:\Users\Admin\AppData\Local\Temp\Serfinanza_Extracto_3925684864088446202605_15411665189244361977_577131188431184261981_8054548415905136416878.exe"
    1⤵
    • Checks QEMU agent file
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: MapViewOfSection
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1208
    • C:\Program Files (x86)\internet explorer\ieinstal.exe
      "C:\Users\Admin\AppData\Local\Temp\Serfinanza_Extracto_3925684864088446202605_15411665189244361977_577131188431184261981_8054548415905136416878.exe"
      2⤵
      • Checks QEMU agent file
      • Adds Run key to start application
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:612
      • C:\Windows\SysWOW64\cmd.exe
        /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
        3⤵
        • Suspicious use of WriteProcessMemory
        PID:1680
        • C:\Windows\SysWOW64\reg.exe
          C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
          4⤵
          • Modifies registry key
          PID:1656

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Privilege Escalation

Bypass User Account Control

1
T1088

Defense Evasion

Bypass User Account Control

1
T1088

Disabling Security Tools

1
T1089

Modify Registry

3
T1112

Discovery

Query Registry

1
T1012

System Information Discovery

1
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/612-79-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-64-0x0000000000090000-0x0000000000190000-memory.dmp
    Filesize

    1024KB

  • memory/612-78-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-65-0x0000000000090000-mapping.dmp
  • memory/612-92-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-91-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-90-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-72-0x0000000077730000-0x0000000077806000-memory.dmp
    Filesize

    856KB

  • memory/612-71-0x0000000077540000-0x00000000776E9000-memory.dmp
    Filesize

    1.7MB

  • memory/612-73-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-76-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-75-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-77-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-80-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-93-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-89-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-74-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-81-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-88-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-87-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-85-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-84-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/612-86-0x0000000000400000-0x0000000000553000-memory.dmp
    Filesize

    1.3MB

  • memory/1208-63-0x0000000076661000-0x0000000076663000-memory.dmp
    Filesize

    8KB

  • memory/1208-66-0x0000000077540000-0x00000000776E9000-memory.dmp
    Filesize

    1.7MB

  • memory/1208-68-0x0000000077730000-0x0000000077806000-memory.dmp
    Filesize

    856KB

  • memory/1208-67-0x0000000077720000-0x00000000778A0000-memory.dmp
    Filesize

    1.5MB

  • memory/1208-61-0x00000000003E0000-0x00000000003F6000-memory.dmp
    Filesize

    88KB

  • memory/1656-83-0x0000000000000000-mapping.dmp
  • memory/1680-82-0x0000000000000000-mapping.dmp