Analysis

  • max time kernel
    151s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-en-20211104
  • submitted
    06-12-2021 03:13

General

  • Target

    SecuriteInfo.com.Trojan.GenericKD.38184020.11638.15716.exe

  • Size

    120KB

  • MD5

    73073649b02ccf2809aee7713ee72ee2

  • SHA1

    b724c23ed90ddf15412aa917d87422274521e48a

  • SHA256

    dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6

  • SHA512

    2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4

Malware Config

Signatures

  • Modifies Windows Defender Real-time Protection settings 3 TTPs
  • Downloads MZ/PE file
  • Executes dropped EXE 3 IoCs
  • UPX packed file 4 IoCs

    Detects executables packed with UPX/modified UPX open source packer.

  • Loads dropped DLL 5 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Suspicious use of NtSetInformationThreadHideFromDebugger 6 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Modifies system certificate store 2 TTPs 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 5 IoCs
  • Suspicious use of AdjustPrivilegeToken 8 IoCs
  • Suspicious use of WriteProcessMemory 61 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.38184020.11638.15716.exe
    "C:\Users\Admin\AppData\Local\Temp\SecuriteInfo.com.Trojan.GenericKD.38184020.11638.15716.exe"
    1⤵
    • Adds Run key to start application
    • Suspicious use of SetThreadContext
    • Modifies system certificate store
    • Suspicious use of WriteProcessMemory
    PID:684
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
      2⤵
      • Loads dropped DLL
      • Suspicious use of WriteProcessMemory
      PID:1160
      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip * -p"8311417383488996" -oC:\Users\Admin\AppData\Roaming\Microsoft\
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:2032
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1012
      • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
        C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe x C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip * -p"9249970918899184" -oC:\Users\Admin\AppData\Roaming\Microsoft\
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of AdjustPrivilegeToken
        PID:1056
    • C:\Windows\bfsvc.exe
      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xa6ceE57d9638dA506ff99899c6C018292Ef4826C -coin etc -worker EasyMiner_Bot -clKernel 3
      2⤵
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      PID:980
    • C:\Windows\explorer.exe
      C:\Windows\bfsvc.exe -log 0 -ftime 60 -pool eu1-etc.ethermine.org:4444 -wal 0xa6ceE57d9638dA506ff99899c6C018292Ef4826C -coin etc -worker EasyMiner_Bot -clKernel 3
      2⤵
      • Loads dropped DLL
      • Suspicious use of NtSetInformationThreadHideFromDebugger
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of WriteProcessMemory
      PID:1752
      • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
        "C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe"
        3⤵
        • Executes dropped EXE
        • Adds Run key to start application
        PID:1412

Network

MITRE ATT&CK Matrix ATT&CK v6

Persistence

Modify Existing Service

1
T1031

Registry Run Keys / Startup Folder

1
T1060

Defense Evasion

Modify Registry

3
T1112

Disabling Security Tools

1
T1089

Install Root Certificate

1
T1130

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Microsoft\7z.dll
    MD5

    42336b5fc6be24babfb87699c858fb27

    SHA1

    38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

    SHA256

    b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

    SHA512

    f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

  • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
    MD5

    86e8388e83be8909d148518cf7b6e083

    SHA1

    4f7fdcf3abc0169b591e502842be074a5188c2c9

    SHA256

    4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

    SHA512

    2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

  • C:\Users\Admin\AppData\Roaming\Microsoft\7z.exe
    MD5

    86e8388e83be8909d148518cf7b6e083

    SHA1

    4f7fdcf3abc0169b591e502842be074a5188c2c9

    SHA256

    4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

    SHA512

    2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

  • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.exe
    MD5

    67a55e73dc3e285f5ecad2f52e4606aa

    SHA1

    280b8d8083aac33e1b05078bb6706f155cae47c7

    SHA256

    fc0e21a8e33d53a30207d3e0e3dc9079e253fc623cc4835877cbc39ca7a826a3

    SHA512

    e12b564cc866d3d50246c4326e0086daa3086adf8084f69c1f0fa49a091ed9a2c93ea07a2f6cc4eec30dea54492dbf12950e8e3e7f6c26208f7b57860f362efe

  • C:\Users\Admin\AppData\Roaming\Microsoft\RegData_Temp.zip
    MD5

    1543b223f63fda679a94d034d23b27ba

    SHA1

    82eb69d0d096ff966679ce92c4fb2dd5a8dd6f1e

    SHA256

    30868a1cadb90f598ec9d96f93650c90883941522134b2e0a2dfeca958958e34

    SHA512

    270de3749322416e371d5177b974450e5e2fbca3570179d2f4811f1fda55aca4ea82cbd0a37d1b56ee8614be154373054b573da854a818caafb41b3cee502f78

  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
    MD5

    73073649b02ccf2809aee7713ee72ee2

    SHA1

    b724c23ed90ddf15412aa917d87422274521e48a

    SHA256

    dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6

    SHA512

    2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4

  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
    MD5

    73073649b02ccf2809aee7713ee72ee2

    SHA1

    b724c23ed90ddf15412aa917d87422274521e48a

    SHA256

    dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6

    SHA512

    2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4

  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.exe
    MD5

    9d99b4d43e4e7a0408c5fe99b4cc4afe

    SHA1

    702436963243f0de2d431ec29b199505a0aa3b90

    SHA256

    c9e36c039bfc370135feabad11840fe457caec3c4914351461f3f9e115194fb3

    SHA512

    44620e76efc6d0cefc1c6f8eca77c0114d41fbf4d6e1f6ff2287286ff57aca1679a0428b35c757afb96fd31d99de8b9e1d956b89636d9c373248e5c5b5b05754

  • C:\Users\Admin\AppData\Roaming\Microsoft\RegHost_Temp.zip
    MD5

    32ab3a6509fe78d666dcafc5be73f2e1

    SHA1

    c16e1c2716b4ae5b9e5bfb9773d810344b539126

    SHA256

    dd2170bbea158a2c2b8c262c2be9c8d91fc3e86efe7f607fce7a9224a389bdec

    SHA512

    c31ee784de253c4f5c36990959d8e6f74b2b0eeecfd265cab2d5295be33f7af056e144d829adcd754c78e06023816cb3f576110314717ee7e50cc0af507f02fe

  • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
    MD5

    42336b5fc6be24babfb87699c858fb27

    SHA1

    38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

    SHA256

    b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

    SHA512

    f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

  • \Users\Admin\AppData\Roaming\Microsoft\7z.dll
    MD5

    42336b5fc6be24babfb87699c858fb27

    SHA1

    38ae0db53b22d2e2f52bfdf25b14d79f8feca7aa

    SHA256

    b5508c1dab79939770ed9aa151b6731af075e84c34a316d36fc90388d3a7af07

    SHA512

    f091cb629231811b14ff7d40d8e8ad5e9e0c389f5c56679efb26e33dc189575f062f16f4e4b7e6caea4c268c07955bfb461ca6e86a16778c37d4cb833c8dc3f3

  • \Users\Admin\AppData\Roaming\Microsoft\7z.exe
    MD5

    86e8388e83be8909d148518cf7b6e083

    SHA1

    4f7fdcf3abc0169b591e502842be074a5188c2c9

    SHA256

    4120c9e964ea7ed9f267ba921367a50f7b0895febe008a10aa91c0c69b966f17

    SHA512

    2d34d381aacd3ef7482e7580dd39760e09805a6bd8380776a40743018218ae18cc9c09aea2f54568f46f9ab12c9042a675c2956e9bc746ddc5afb22bb26e3c5e

  • \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
    MD5

    73073649b02ccf2809aee7713ee72ee2

    SHA1

    b724c23ed90ddf15412aa917d87422274521e48a

    SHA256

    dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6

    SHA512

    2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4

  • \Users\Admin\AppData\Roaming\Microsoft\RegHost.exe
    MD5

    73073649b02ccf2809aee7713ee72ee2

    SHA1

    b724c23ed90ddf15412aa917d87422274521e48a

    SHA256

    dcd20edf47f46b27c1b81cf03d18dc00aecff1d1eba9f0a0e55e1182f4a2f0b6

    SHA512

    2c3688c829ee654a5eb65d3633478a01072ccedb69724bcb71d059823ab0a486a30867207c3d05ad56fc7005e46fa78690c152f019a5e0cd4ea92a11357a59e4

  • memory/684-55-0x000007FEFB761000-0x000007FEFB763000-memory.dmp
    Filesize

    8KB

  • memory/980-89-0x000007FFFFBD0000-0x000007FFFFFA1000-memory.dmp
    Filesize

    3.8MB

  • memory/980-70-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-72-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-73-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-75-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-76-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-78-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-79-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-80-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-81-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-82-0x000000014165D878-mapping.dmp
  • memory/980-98-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-71-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-102-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-96-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-87-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-69-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-88-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-99-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-104-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-91-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/980-94-0x0000000140000000-0x0000000141660000-memory.dmp
    Filesize

    22.4MB

  • memory/1012-63-0x0000000000000000-mapping.dmp
  • memory/1056-64-0x0000000000000000-mapping.dmp
  • memory/1160-56-0x0000000000000000-mapping.dmp
  • memory/1412-121-0x0000000000000000-mapping.dmp
  • memory/1752-84-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-109-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-95-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-100-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-105-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-106-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-107-0x0000000140E36784-mapping.dmp
  • memory/1752-113-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-112-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-111-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-110-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-101-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-116-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-114-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-115-0x000007FFFFBD0000-0x000007FFFFFA1000-memory.dmp
    Filesize

    3.8MB

  • memory/1752-117-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-92-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-90-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-86-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/1752-85-0x0000000140000000-0x0000000140E38000-memory.dmp
    Filesize

    14.2MB

  • memory/2032-58-0x0000000000000000-mapping.dmp