Analysis

  • max time kernel
    123s
  • max time network
    144s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    05-12-2021 01:02

General

  • Target

    ?? ?? ?????????doc.com.exe

  • Size

    848KB

  • MD5

    06559a48b54cc741ec37f24c437cd199

  • SHA1

    daa15a2ed47960179c9611ba84520bc5f8002873

  • SHA256

    2b7062e20c674dd25059533ecfbb5a66ab3ecda2e01c30e8c9a81cc4290b8f11

  • SHA512

    8d8325f6e9b29201861a28eaf6fe26f3013bf2b64be514e1b5dc329c986a41abe7a4fc5210e7c5b5e8f0dffc0521bd1d005b7260ec6ed699bb407b66d6ae66df

Score
8/10

Malware Config

Signatures

  • Executes dropped EXE 2 IoCs
  • UPX packed file 3 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 23 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in System32 directory 1 IoCs
  • Suspicious use of SetThreadContext 1 IoCs
  • Checks processor information in registry 2 TTPs 2 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies data under HKEY_USERS 12 IoCs
  • Suspicious behavior: EnumeratesProcesses 37 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Suspicious use of SetWindowsHookEx 1 IoCs
  • Suspicious use of WriteProcessMemory 6 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\__ __ _________doc.com.exe
    "C:\Users\Admin\AppData\Local\Temp\__ __ _________doc.com.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of SetWindowsHookEx
    PID:1648
    • C:\Users\Admin\Documents\lsassa.exe
      "C:\Users\Admin\Documents\lsassa.exe"
      2⤵
      • Executes dropped EXE
      • Suspicious use of SetThreadContext
      • Suspicious use of WriteProcessMemory
      PID:284
      • C:\Users\Admin\Documents\lsassa.exe
        C:\Users\Admin\Documents\lsassa.exe
        3⤵
        • Executes dropped EXE
        • Enumerates connected drives
        • Drops file in System32 directory
        • Checks processor information in registry
        • Modifies data under HKEY_USERS
        • Suspicious behavior: EnumeratesProcesses
        • Suspicious use of AdjustPrivilegeToken
        PID:1484

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

1
T1112

Discovery

Query Registry

2
T1012

Peripheral Device Discovery

1
T1120

System Information Discovery

2
T1082

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\Documents\lsassa.exe
    MD5

    9a407574432270a19ec46ddf1c6dbe5d

    SHA1

    e38e2827a57dc2ebd37acb6a62aa11c46f242ef5

    SHA256

    f911f21b819fe3de51f8f880abb7a7a921e38fdf5618462f8a5ff2feca2f4800

    SHA512

    6401f5386a0b944e606fa1fd194a5f22bc83b102abdb04324be5a7a5fed7161a7a8a8fb90306a556c6922200f5558a3434cf72fecdecc5eae156db667059f5c6

  • C:\Users\Admin\Documents\lsassa.exe
    MD5

    9a407574432270a19ec46ddf1c6dbe5d

    SHA1

    e38e2827a57dc2ebd37acb6a62aa11c46f242ef5

    SHA256

    f911f21b819fe3de51f8f880abb7a7a921e38fdf5618462f8a5ff2feca2f4800

    SHA512

    6401f5386a0b944e606fa1fd194a5f22bc83b102abdb04324be5a7a5fed7161a7a8a8fb90306a556c6922200f5558a3434cf72fecdecc5eae156db667059f5c6

  • C:\Users\Admin\Documents\md5.png
    MD5

    047bbdd42c244b7aa2c15d48fff96a29

    SHA1

    e658b8abebb77ee1d8d3458f314a226d56d0f9b8

    SHA256

    f9cfa36f4bde6457ea5138f4ded1ba18d05e31950c3de119e25e540c3dc5efcf

    SHA512

    e37e64d5ef56799b3982e7dcb6c18270d9301859afa8b4ecf6a48d399168b061f0ab99b84cbb77e0b50dfc93802595f052202447d4a971afb56a3296c70fc8c5

  • memory/1484-62-0x0000000000400000-0x0000000000534000-memory.dmp
    Filesize

    1.2MB

  • memory/1484-59-0x0000000000400000-0x0000000000534000-memory.dmp
    Filesize

    1.2MB

  • memory/1484-60-0x0000000000530D30-mapping.dmp
  • memory/1484-58-0x0000000000400000-0x0000000000534000-memory.dmp
    Filesize

    1.2MB

  • memory/1484-65-0x0000000010096000-0x0000000010099000-memory.dmp
    Filesize

    12KB

  • memory/1484-64-0x0000000010001000-0x0000000010096000-memory.dmp
    Filesize

    596KB

  • memory/1484-66-0x0000000010099000-0x00000000100B4000-memory.dmp
    Filesize

    108KB

  • memory/1484-67-0x00000000100B4000-0x00000000100F6000-memory.dmp
    Filesize

    264KB

  • memory/1484-68-0x0000000010183000-0x0000000010187000-memory.dmp
    Filesize

    16KB

  • memory/1484-69-0x0000000000400000-0x0000000000534000-memory.dmp
    Filesize

    1.2MB

  • memory/1648-55-0x0000000075491000-0x0000000075493000-memory.dmp
    Filesize

    8KB