Analysis

  • max time kernel
    114s
  • max time network
    57s
  • platform
    windows7_x64
  • resource
    win7v20210410
  • submitted
    01-08-2021 09:46

General

  • Target

    B30EEBF734354F55373978E395C912393F3C674AAA471.exe

  • Size

    117KB

  • MD5

    b72d429d1d690165c7b0de4a074c4a58

  • SHA1

    f0704d227482a80f2f90dab79ed4acd9770fe565

  • SHA256

    b30eebf734354f55373978e395c912393f3c674aaa4717748ae449b09832f6ae

  • SHA512

    f3b565e67d5a15d5305982701bd5f0d37eec0bfe2d152556584fa1d01faf1def6e616d0addea91e0663be084450b49f99e2108cc06a9b50c9e1482f9290b6c5c

Score
10/10

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Windows security modification 2 TTPs 1 IoCs
  • Program crash 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of SetWindowsHookEx 3 IoCs
  • Suspicious use of WriteProcessMemory 9 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\B30EEBF734354F55373978E395C912393F3C674AAA471.exe
    "C:\Users\Admin\AppData\Local\Temp\B30EEBF734354F55373978E395C912393F3C674AAA471.exe"
    1⤵
    • Windows security modification
    • Modifies system certificate store
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1668
    • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
      "powershell" Get-MpPreference -verbose
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1608
    • C:\Windows\system32\schtasks.exe
      "schtasks" /delete /tn "WindowsUpdate.exe" /f
      2⤵
        PID:1072
      • C:\Windows\system32\WerFault.exe
        C:\Windows\system32\WerFault.exe -u -p 1668 -s 932
        2⤵
        • Program crash
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of AdjustPrivilegeToken
        PID:1828

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Modify Existing Service

    1
    T1031

    Defense Evasion

    Modify Registry

    3
    T1112

    Disabling Security Tools

    2
    T1089

    Install Root Certificate

    1
    T1130

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/1072-91-0x0000000000000000-mapping.dmp
    • memory/1608-67-0x000007FEFC301000-0x000007FEFC303000-memory.dmp
      Filesize

      8KB

    • memory/1608-90-0x000000001A970000-0x000000001A971000-memory.dmp
      Filesize

      4KB

    • memory/1608-89-0x0000000002870000-0x0000000002871000-memory.dmp
      Filesize

      4KB

    • memory/1608-77-0x000000001A930000-0x000000001A931000-memory.dmp
      Filesize

      4KB

    • memory/1608-66-0x0000000000000000-mapping.dmp
    • memory/1608-74-0x000000001A900000-0x000000001A901000-memory.dmp
      Filesize

      4KB

    • memory/1608-68-0x0000000002400000-0x0000000002401000-memory.dmp
      Filesize

      4KB

    • memory/1608-69-0x000000001AD20000-0x000000001AD21000-memory.dmp
      Filesize

      4KB

    • memory/1608-70-0x000000001ACA0000-0x000000001ACA2000-memory.dmp
      Filesize

      8KB

    • memory/1608-71-0x000000001ACA4000-0x000000001ACA6000-memory.dmp
      Filesize

      8KB

    • memory/1608-72-0x0000000002440000-0x0000000002441000-memory.dmp
      Filesize

      4KB

    • memory/1608-73-0x0000000002470000-0x0000000002471000-memory.dmp
      Filesize

      4KB

    • memory/1668-102-0x000000001B140000-0x000000001B141000-memory.dmp
      Filesize

      4KB

    • memory/1668-100-0x000000001B13E000-0x000000001B13F000-memory.dmp
      Filesize

      4KB

    • memory/1668-65-0x000000001B119000-0x000000001B138000-memory.dmp
      Filesize

      124KB

    • memory/1668-63-0x000000001B112000-0x000000001B113000-memory.dmp
      Filesize

      4KB

    • memory/1668-62-0x000000001B110000-0x000000001B112000-memory.dmp
      Filesize

      8KB

    • memory/1668-111-0x000000001B14A000-0x000000001B14C000-memory.dmp
      Filesize

      8KB

    • memory/1668-95-0x000000001B139000-0x000000001B13A000-memory.dmp
      Filesize

      4KB

    • memory/1668-94-0x000000001B138000-0x000000001B139000-memory.dmp
      Filesize

      4KB

    • memory/1668-97-0x000000001B13B000-0x000000001B13C000-memory.dmp
      Filesize

      4KB

    • memory/1668-96-0x000000001B13A000-0x000000001B13B000-memory.dmp
      Filesize

      4KB

    • memory/1668-99-0x000000001B13D000-0x000000001B13E000-memory.dmp
      Filesize

      4KB

    • memory/1668-98-0x000000001B13C000-0x000000001B13D000-memory.dmp
      Filesize

      4KB

    • memory/1668-101-0x000000001B13F000-0x000000001B140000-memory.dmp
      Filesize

      4KB

    • memory/1668-64-0x000000001B114000-0x000000001B115000-memory.dmp
      Filesize

      4KB

    • memory/1668-60-0x0000000000AC0000-0x0000000000AC1000-memory.dmp
      Filesize

      4KB

    • memory/1668-103-0x000000001B141000-0x000000001B142000-memory.dmp
      Filesize

      4KB

    • memory/1668-104-0x000000001B142000-0x000000001B143000-memory.dmp
      Filesize

      4KB

    • memory/1668-106-0x000000001B144000-0x000000001B145000-memory.dmp
      Filesize

      4KB

    • memory/1668-105-0x000000001B143000-0x000000001B144000-memory.dmp
      Filesize

      4KB

    • memory/1668-108-0x000000001B146000-0x000000001B147000-memory.dmp
      Filesize

      4KB

    • memory/1668-107-0x000000001B145000-0x000000001B146000-memory.dmp
      Filesize

      4KB

    • memory/1668-110-0x000000001B148000-0x000000001B14A000-memory.dmp
      Filesize

      8KB

    • memory/1668-109-0x000000001B147000-0x000000001B148000-memory.dmp
      Filesize

      4KB

    • memory/1828-112-0x0000000001C20000-0x0000000001C21000-memory.dmp
      Filesize

      4KB

    • memory/1828-92-0x0000000000000000-mapping.dmp