Resubmissions

03/02/2022, 13:26

220203-qpq5cahggm 3

01/02/2022, 11:13

220201-nbqkjsdear 10

01/02/2022, 11:12

220201-na5m3sdeak 10

31/12/2021, 08:31

211231-keqg6sggb4 10

Analysis

  • max time kernel
    152s
  • max time network
    157s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-en-20220112
  • submitted
    01/02/2022, 11:13

General

  • Target

    ConsoleApp7.exe

  • Size

    53KB

  • MD5

    b2993b2a7a1edba14742564de7e85cb2

  • SHA1

    cf7f1085978128cc082aec921d34d6d25e4ab19b

  • SHA256

    800b4455105a08833332092017909f9dd47bd4ebfb1cbddbe0b95658d03b8d64

  • SHA512

    a64951f5026a2f3bb01652bae0267b1d4b88b017a64208bb2e556a755a44e86eab0df33d43e759defe4caefc30693099b74fa1ebac90ff323ac2e555f51d892a

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateProcessExOtherParentProcess 1 IoCs
  • Sets service image path in registry 2 TTPs
  • Drops file in Windows directory 1 IoCs
  • Program crash 1 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 2 IoCs
  • Modifies data under HKEY_USERS 41 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\ConsoleApp7.exe
    "C:\Users\Admin\AppData\Local\Temp\ConsoleApp7.exe"
    1⤵
    • Suspicious use of AdjustPrivilegeToken
    PID:2716
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 1400
      2⤵
      • Drops file in Windows directory
      • Program crash
      • Checks processor information in registry
      • Enumerates system info in registry
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3252
  • C:\Windows\System32\WaaSMedicAgent.exe
    C:\Windows\System32\WaaSMedicAgent.exe 1b0b669cb94d40241a2599eb584ec400 kzNOHWgkbkuSnUfGtYbUsQ.0.1.0.0.0
    1⤵
    • Modifies data under HKEY_USERS
    PID:404
  • C:\Windows\SysWOW64\WerFault.exe
    C:\Windows\SysWOW64\WerFault.exe -pss -s 180 -p 2716 -ip 2716
    1⤵
    • Suspicious use of NtCreateProcessExOtherParentProcess
    • Suspicious use of WriteProcessMemory
    PID:364

Network

MITRE ATT&CK Enterprise v6

Replay Monitor

Loading Replay Monitor...

Downloads

  • memory/2716-130-0x0000000000740000-0x0000000000752000-memory.dmp

    Filesize

    72KB

  • memory/2716-131-0x00000000056B0000-0x0000000005C54000-memory.dmp

    Filesize

    5.6MB

  • memory/2716-132-0x00000000051A0000-0x0000000005232000-memory.dmp

    Filesize

    584KB

  • memory/2716-133-0x0000000005100000-0x00000000056A4000-memory.dmp

    Filesize

    5.6MB