Resubmissions

29-07-2021 08:36

210729-5h67qwvrd2 10

27-07-2021 14:54

210727-v3d6d2mxcs 10

Analysis

  • max time kernel
    253s
  • max time network
    155s
  • platform
    windows7_x64
  • resource
    win7v20210408
  • submitted
    29-07-2021 08:36

General

  • Target

    iCoreBr.jpg.dll

  • Size

    1.3MB

  • MD5

    132e6560ca121679635684e812586bba

  • SHA1

    6f48b7929e65aac27f3bf3cce24c7ad40624dc74

  • SHA256

    c882f778e40b276c90d467816deda7605d9955e4302aa6ab7467aeae3f155048

  • SHA512

    3c3fd439c29e36a2ef174f82c4df36c89a87bbc2e280753166bc25b14b6066fc6b0eff7101e4b301e51722271b76ebdb79dbf58a201a7a4c8bcb64e708e6a4a5

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 1 IoCs
  • Loads dropped DLL 1 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Modifies registry key 1 TTPs 1 IoCs
  • Runs ping.exe 1 TTPs 2 IoCs
  • Suspicious behavior: CmdExeWriteProcessMemorySpam 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 3 IoCs
  • Suspicious use of WriteProcessMemory 48 IoCs

Processes

  • C:\Windows\Explorer.EXE
    C:\Windows\Explorer.EXE
    1⤵
      PID:1208
      • C:\Windows\system32\regsvr32.exe
        regsvr32 /s C:\Users\Admin\AppData\Local\Temp\iCoreBr.jpg.dll
        2⤵
        • Suspicious use of WriteProcessMemory
        PID:1648
        • C:\Windows\system32\cmd.exe
          cmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\iCoreBr.jpg.dll" mscp ahis & exit
          3⤵
          • Suspicious use of WriteProcessMemory
          PID:648
          • C:\Windows\system32\PING.EXE
            ping 127.0.0.1 -n 8
            4⤵
            • Runs ping.exe
            PID:768
          • C:\Windows\system32\regsvr32.exe
            "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\iCoreBr.jpg.dll" mscp ahis
            4⤵
            • Suspicious behavior: CmdExeWriteProcessMemorySpam
            • Suspicious behavior: EnumeratesProcesses
            • Suspicious use of WriteProcessMemory
            PID:1700
            • C:\Windows\system32\cmd.exe
              cmd.exe /c echo %temp%
              5⤵
                PID:1084
              • C:\Windows\system32\cmd.exe
                cmd.exe /c reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v RealtechUpdate /t REG_SZ /d "\"C:\Windows\system32\regsvr32.exe\" /s \"C:\Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe\" mscp arih"
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1292
                • C:\Windows\system32\reg.exe
                  reg.exe add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v RealtechUpdate /t REG_SZ /d "\"C:\Windows\system32\regsvr32.exe\" /s \"C:\Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe\" mscp arih"
                  6⤵
                  • Adds Run key to start application
                  • Modifies registry key
                  PID:300
              • C:\Windows\system32\cmd.exe
                cmd /c ping 127.0.0.1 -n 8 & "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe" mscp arih & exit
                5⤵
                • Suspicious use of WriteProcessMemory
                PID:1300
                • C:\Windows\system32\PING.EXE
                  ping 127.0.0.1 -n 8
                  6⤵
                  • Runs ping.exe
                  PID:664
                • C:\Windows\system32\regsvr32.exe
                  "C:\Windows\system32\regsvr32.exe" /s "C:\Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe" mscp arih
                  6⤵
                  • Suspicious use of NtCreateUserProcessOtherParentProcess
                  • Loads dropped DLL
                  • Suspicious use of SetThreadContext
                  • Suspicious behavior: CmdExeWriteProcessMemorySpam
                  • Suspicious behavior: EnumeratesProcesses
                  • Suspicious use of WriteProcessMemory
                  PID:848
                  • C:\Windows\system32\cmd.exe
                    cmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                    7⤵
                    • Suspicious use of WriteProcessMemory
                    PID:1536
                    • C:\Windows\system32\reg.exe
                      reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths"
                      8⤵
                        PID:744
                    • C:\Windows\system32\cmd.exe
                      cmd.exe /c reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"
                      7⤵
                      • Suspicious use of WriteProcessMemory
                      PID:1608
                      • C:\Windows\system32\reg.exe
                        reg.exe query "HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\App Paths\chrome.exe" /v "Path"
                        8⤵
                          PID:1792
            • C:\Program Files\Google\Chrome\Application\chrome.exe
              "C:\Program Files\Google\Chrome\Application\chrome.exe" mscp amw fkprm "C:\Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe"
              2⤵
                PID:1128

            Network

            MITRE ATT&CK Matrix ATT&CK v6

            Persistence

            Registry Run Keys / Startup Folder

            1
            T1060

            Defense Evasion

            Modify Registry

            2
            T1112

            Discovery

            Remote System Discovery

            1
            T1018

            Replay Monitor

            Loading Replay Monitor...

            Downloads

            • C:\Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe
              MD5

              132e6560ca121679635684e812586bba

              SHA1

              6f48b7929e65aac27f3bf3cce24c7ad40624dc74

              SHA256

              c882f778e40b276c90d467816deda7605d9955e4302aa6ab7467aeae3f155048

              SHA512

              3c3fd439c29e36a2ef174f82c4df36c89a87bbc2e280753166bc25b14b6066fc6b0eff7101e4b301e51722271b76ebdb79dbf58a201a7a4c8bcb64e708e6a4a5

            • \Users\Admin\AppData\Local\Temp\Damp\ixswdpbvpsyhy.exe
              MD5

              132e6560ca121679635684e812586bba

              SHA1

              6f48b7929e65aac27f3bf3cce24c7ad40624dc74

              SHA256

              c882f778e40b276c90d467816deda7605d9955e4302aa6ab7467aeae3f155048

              SHA512

              3c3fd439c29e36a2ef174f82c4df36c89a87bbc2e280753166bc25b14b6066fc6b0eff7101e4b301e51722271b76ebdb79dbf58a201a7a4c8bcb64e708e6a4a5

            • memory/300-70-0x0000000000000000-mapping.dmp
            • memory/648-62-0x0000000000000000-mapping.dmp
            • memory/664-71-0x0000000000000000-mapping.dmp
            • memory/744-78-0x0000000000000000-mapping.dmp
            • memory/768-63-0x0000000000000000-mapping.dmp
            • memory/848-76-0x0000000001D90000-0x0000000001DF4000-memory.dmp
              Filesize

              400KB

            • memory/848-72-0x0000000000000000-mapping.dmp
            • memory/1084-67-0x0000000000000000-mapping.dmp
            • memory/1128-83-0x00000000009E0000-0x0000000000B83000-memory.dmp
              Filesize

              1.6MB

            • memory/1128-82-0x0000000000B82020-mapping.dmp
            • memory/1128-84-0x0000000029020000-0x0000000029084000-memory.dmp
              Filesize

              400KB

            • memory/1128-81-0x00000000009E0000-0x0000000000B83000-memory.dmp
              Filesize

              1.6MB

            • memory/1292-68-0x0000000000000000-mapping.dmp
            • memory/1300-69-0x0000000000000000-mapping.dmp
            • memory/1536-77-0x0000000000000000-mapping.dmp
            • memory/1608-79-0x0000000000000000-mapping.dmp
            • memory/1648-60-0x000007FEFBED1000-0x000007FEFBED3000-memory.dmp
              Filesize

              8KB

            • memory/1648-61-0x0000000001F40000-0x0000000001FA4000-memory.dmp
              Filesize

              400KB

            • memory/1700-66-0x00000000020E0000-0x0000000002144000-memory.dmp
              Filesize

              400KB

            • memory/1700-64-0x0000000000000000-mapping.dmp
            • memory/1792-80-0x0000000000000000-mapping.dmp