Analysis

  • max time kernel
    153s
  • max time network
    175s
  • platform
    windows10_x64
  • resource
    win10-en-20211104
  • submitted
    08-11-2021 10:07

General

  • Target

    7dc7ca24149bd2f34bc1bf8942cb3ed8730482e4e90a16b5333092ddb80bd084.exe

  • Size

    96KB

  • MD5

    c202f1103c957930ec4cc01b43dfd472

  • SHA1

    ffed9fc2e035d31f1b2e098471e8ec70334ff9fc

  • SHA256

    7dc7ca24149bd2f34bc1bf8942cb3ed8730482e4e90a16b5333092ddb80bd084

  • SHA512

    569aa632a2677cb9d1b0186f19676161853ceea55cb6ee94cfcc6ad4b558c57a2694ab0d2dc541484e4099530b2aab742b95d08c093150efa6585d98ce6356e4

Score
10/10

Malware Config

Signatures

  • Process spawned unexpected child process 1 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • suricata: ET MALWARE ClipBanker Variant Activity (POST)

    suricata: ET MALWARE ClipBanker Variant Activity (POST)

  • Loads dropped DLL 1 IoCs
  • Looks up external IP address via web service 1 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 5 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 16 IoCs
  • Modifies registry class 18 IoCs
  • Script User-Agent 1 IoCs

    Uses user-agent string associated with script host/environment.

  • Suspicious behavior: EnumeratesProcesses 4 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of WriteProcessMemory 33 IoCs

Processes

  • c:\windows\system32\svchost.exe
    c:\windows\system32\svchost.exe -k netsvcs -s gpsvc
    1⤵
      PID:356
    • c:\windows\system32\svchost.exe
      c:\windows\system32\svchost.exe -k netsvcs -s Schedule
      1⤵
        PID:1044
      • c:\windows\system32\svchost.exe
        c:\windows\system32\svchost.exe -k netsvcs -s ProfSvc
        1⤵
          PID:1148
        • c:\windows\system32\svchost.exe
          c:\windows\system32\svchost.exe -k netsvcs -s Themes
          1⤵
            PID:1184
          • c:\windows\system32\svchost.exe
            c:\windows\system32\svchost.exe -k netsvcs -s SENS
            1⤵
              PID:1444
            • c:\windows\system32\svchost.exe
              c:\windows\system32\svchost.exe -k netsvcs -s ShellHWDetection
              1⤵
                PID:1916
              • c:\windows\system32\svchost.exe
                c:\windows\system32\svchost.exe -k netsvcs -s UserManager
                1⤵
                  PID:1432
                • c:\windows\system32\svchost.exe
                  c:\windows\system32\svchost.exe -k netsvcs -s LanmanServer
                  1⤵
                    PID:2344
                  • c:\windows\system32\svchost.exe
                    c:\windows\system32\svchost.exe -k netsvcs -s IKEEXT
                    1⤵
                      PID:2360
                    • c:\windows\system32\svchost.exe
                      c:\windows\system32\svchost.exe -k netsvcs -s Browser
                      1⤵
                        PID:2580
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s WpnService
                        1⤵
                        • Modifies registry class
                        PID:2676
                      • c:\windows\system32\svchost.exe
                        c:\windows\system32\svchost.exe -k netsvcs -s Winmgmt
                        1⤵
                        • Suspicious use of AdjustPrivilegeToken
                        • Suspicious use of WriteProcessMemory
                        PID:2692
                        • C:\Windows\system32\wbem\WMIADAP.EXE
                          wmiadap.exe /F /T /R
                          2⤵
                            PID:2292
                        • c:\windows\system32\svchost.exe
                          c:\windows\system32\svchost.exe -k netsvcs -s BITS
                          1⤵
                          • Suspicious use of SetThreadContext
                          • Modifies registry class
                          • Suspicious behavior: EnumeratesProcesses
                          • Suspicious use of AdjustPrivilegeToken
                          • Suspicious use of WriteProcessMemory
                          PID:3844
                          • C:\Windows\system32\svchost.exe
                            C:\Windows\system32\svchost.exe -k SystemNetworkService
                            2⤵
                            • Drops file in System32 directory
                            • Checks processor information in registry
                            • Modifies data under HKEY_USERS
                            • Modifies registry class
                            • Suspicious use of WriteProcessMemory
                            PID:3760
                        • C:\Users\Admin\AppData\Local\Temp\7dc7ca24149bd2f34bc1bf8942cb3ed8730482e4e90a16b5333092ddb80bd084.exe
                          "C:\Users\Admin\AppData\Local\Temp\7dc7ca24149bd2f34bc1bf8942cb3ed8730482e4e90a16b5333092ddb80bd084.exe"
                          1⤵
                            PID:2200
                          • C:\Windows\system32\rundll32.exe
                            rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                            1⤵
                            • Process spawned unexpected child process
                            • Suspicious use of WriteProcessMemory
                            PID:3620
                            • C:\Windows\SysWOW64\rundll32.exe
                              rundll32.exe "C:\Users\Admin\AppData\Local\Temp\sqlite.dll",global
                              2⤵
                              • Loads dropped DLL
                              • Modifies registry class
                              • Suspicious behavior: EnumeratesProcesses
                              • Suspicious use of AdjustPrivilegeToken
                              • Suspicious use of WriteProcessMemory
                              PID:4028

                          Network

                          MITRE ATT&CK Enterprise v6

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • memory/356-191-0x000001DC7B070000-0x000001DC7B0E2000-memory.dmp

                            Filesize

                            456KB

                          • memory/356-132-0x000001DC7A8A0000-0x000001DC7A8A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/356-157-0x000001DC7A980000-0x000001DC7A9F2000-memory.dmp

                            Filesize

                            456KB

                          • memory/356-179-0x000001DC7A8A0000-0x000001DC7A8A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/356-130-0x000001DC7A8A0000-0x000001DC7A8A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1044-139-0x0000019B744F0000-0x0000019B744F2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1044-161-0x0000019B74C40000-0x0000019B74CB2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1044-140-0x0000019B744F0000-0x0000019B744F2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1044-195-0x0000019B74E70000-0x0000019B74EE2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1044-183-0x0000019B744F0000-0x0000019B744F2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1148-160-0x0000018D99F40000-0x0000018D99FB2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1148-194-0x0000018D9A440000-0x0000018D9A4B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1148-182-0x0000018D994D0000-0x0000018D994D2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1148-137-0x0000018D994D0000-0x0000018D994D2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1148-138-0x0000018D994D0000-0x0000018D994D2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1184-186-0x000001F5B6580000-0x000001F5B6582000-memory.dmp

                            Filesize

                            8KB

                          • memory/1184-145-0x000001F5B6580000-0x000001F5B6582000-memory.dmp

                            Filesize

                            8KB

                          • memory/1184-146-0x000001F5B6580000-0x000001F5B6582000-memory.dmp

                            Filesize

                            8KB

                          • memory/1184-198-0x000001F5B7240000-0x000001F5B72B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1184-164-0x000001F5B6D30000-0x000001F5B6DA2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1432-187-0x000001753F7F0000-0x000001753F7F2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1432-199-0x0000017540540000-0x00000175405B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1432-165-0x000001753FA70000-0x000001753FAE2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1432-148-0x000001753F7F0000-0x000001753F7F2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1432-147-0x000001753F7F0000-0x000001753F7F2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1444-162-0x000002BD0F340000-0x000002BD0F3B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1444-141-0x000002BD0F0E0000-0x000002BD0F0E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1444-196-0x000002BD0FA00000-0x000002BD0FA72000-memory.dmp

                            Filesize

                            456KB

                          • memory/1444-142-0x000002BD0F0E0000-0x000002BD0F0E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1444-184-0x000002BD0F0E0000-0x000002BD0F0E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1916-197-0x000001B127C40000-0x000001B127CB2000-memory.dmp

                            Filesize

                            456KB

                          • memory/1916-185-0x000001B126EA0000-0x000001B126EA2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1916-143-0x000001B126EA0000-0x000001B126EA2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1916-144-0x000001B126EA0000-0x000001B126EA2000-memory.dmp

                            Filesize

                            8KB

                          • memory/1916-163-0x000001B127740000-0x000001B1277B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2344-181-0x0000013C898D0000-0x0000013C898D2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2344-193-0x0000013C8A740000-0x0000013C8A7B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2344-159-0x0000013C8A160000-0x0000013C8A1D2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2344-135-0x0000013C898D0000-0x0000013C898D2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2344-136-0x0000013C898D0000-0x0000013C898D2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2360-180-0x0000024159E90000-0x0000024159E92000-memory.dmp

                            Filesize

                            8KB

                          • memory/2360-134-0x0000024159E90000-0x0000024159E92000-memory.dmp

                            Filesize

                            8KB

                          • memory/2360-133-0x0000024159E90000-0x0000024159E92000-memory.dmp

                            Filesize

                            8KB

                          • memory/2360-158-0x000002415A650000-0x000002415A6C2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2360-192-0x000002415AD40000-0x000002415ADB2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2580-155-0x00000158C6B30000-0x00000158C6BA2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2580-128-0x00000158C6110000-0x00000158C6112000-memory.dmp

                            Filesize

                            8KB

                          • memory/2580-178-0x00000158C6110000-0x00000158C6112000-memory.dmp

                            Filesize

                            8KB

                          • memory/2580-127-0x00000158C6110000-0x00000158C6112000-memory.dmp

                            Filesize

                            8KB

                          • memory/2580-190-0x00000158C7040000-0x00000158C70B2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2676-201-0x000001DD86430000-0x000001DD864A2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2676-189-0x000001DD856C0000-0x000001DD856C2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2676-167-0x000001DD86000000-0x000001DD86072000-memory.dmp

                            Filesize

                            456KB

                          • memory/2676-151-0x000001DD856C0000-0x000001DD856C2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2676-152-0x000001DD856C0000-0x000001DD856C2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2692-150-0x00000184A79A0000-0x00000184A79A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2692-166-0x00000184A8310000-0x00000184A8382000-memory.dmp

                            Filesize

                            456KB

                          • memory/2692-149-0x00000184A79A0000-0x00000184A79A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/2692-200-0x00000184A8B40000-0x00000184A8BB2000-memory.dmp

                            Filesize

                            456KB

                          • memory/2692-188-0x00000184A79A0000-0x00000184A79A2000-memory.dmp

                            Filesize

                            8KB

                          • memory/3760-171-0x00000158C2900000-0x00000158C2A05000-memory.dmp

                            Filesize

                            1.0MB

                          • memory/3760-156-0x00000158C0200000-0x00000158C0272000-memory.dmp

                            Filesize

                            456KB

                          • memory/3760-169-0x00000158C00E0000-0x00000158C00E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/3760-168-0x00000158C00E0000-0x00000158C00E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/3760-129-0x00000158C00E0000-0x00000158C00E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/3760-170-0x00000158C1A30000-0x00000158C1A4B000-memory.dmp

                            Filesize

                            108KB

                          • memory/3760-131-0x00000158C00E0000-0x00000158C00E2000-memory.dmp

                            Filesize

                            8KB

                          • memory/3844-174-0x00000218081E0000-0x00000218081E1000-memory.dmp

                            Filesize

                            4KB

                          • memory/3844-154-0x0000021808580000-0x00000218085F2000-memory.dmp

                            Filesize

                            456KB

                          • memory/3844-173-0x00000218081F0000-0x00000218081F4000-memory.dmp

                            Filesize

                            16KB

                          • memory/3844-153-0x00000218084C0000-0x000002180850D000-memory.dmp

                            Filesize

                            308KB

                          • memory/3844-175-0x00000218081E0000-0x00000218081E4000-memory.dmp

                            Filesize

                            16KB

                          • memory/3844-125-0x0000021808190000-0x0000021808192000-memory.dmp

                            Filesize

                            8KB

                          • memory/3844-124-0x0000021808190000-0x0000021808192000-memory.dmp

                            Filesize

                            8KB

                          • memory/3844-177-0x0000021808120000-0x0000021808124000-memory.dmp

                            Filesize

                            16KB

                          • memory/4028-123-0x00000000042C0000-0x000000000431D000-memory.dmp

                            Filesize

                            372KB

                          • memory/4028-122-0x0000000000802000-0x0000000000903000-memory.dmp

                            Filesize

                            1.0MB