Analysis

  • max time kernel
    135s
  • max time network
    148s
  • platform
    windows7_x64
  • resource
    win7-20220718-en
  • resource tags

    arch:x64arch:x86image:win7-20220718-enlocale:en-usos:windows7-x64system
  • submitted
    25-07-2022 03:17

General

  • Target

    6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe

  • Size

    724KB

  • MD5

    61234732aaee3b52d2a921c61f4a5ca0

  • SHA1

    af3b4b38706e62632d33ed46c14db107b2e86087

  • SHA256

    6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754

  • SHA512

    c5db3da3a615f95caed497d86d2582145f1b31e9effd2c16976a55adb12f9f74acd78a728f9f8fda791199f6675dc6b6f388e7465d3d1f89f45dac674d2ab6c5

Malware Config

Signatures

  • UAC bypass 3 TTPs 1 IoCs
  • Windows security bypass 2 TTPs 1 IoCs
  • XpertRAT

    XpertRAT is a remote access trojan with various capabilities.

  • Adds policy Run key to start application 2 TTPs 2 IoCs
  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 3 IoCs
  • Windows security modification 2 TTPs 1 IoCs
  • Adds Run key to start application 2 TTPs 6 IoCs
  • Checks whether UAC is enabled 1 TTPs 1 IoCs
  • Suspicious use of SetThreadContext 2 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Modifies registry key 1 TTPs 1 IoCs
  • Suspicious behavior: EnumeratesProcesses 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 1 IoCs
  • Suspicious use of SetWindowsHookEx 4 IoCs
  • Suspicious use of WriteProcessMemory 34 IoCs
  • System policy modification 1 TTPs 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe
    "C:\Users\Admin\AppData\Local\Temp\6907f16f7d1e603081bd0252d87947ad80af921222626c521b9b0f2202ebd754.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1956
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /Create /SC HOURLY /MO 23 /TN "Abidingness2" /TR "reg add "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "\""Abidingness2"\"" /f /t REG_SZ /d "\""C:\Users\Admin\AppData\Local\Temp\Emerge.exe\""
      2⤵
      • Creates scheduled task(s)
      PID:988
    • C:\Windows\SysWOW64\schtasks.exe
      "C:\Windows\System32\schtasks.exe" /run /tn "Abidingness2"
      2⤵
        PID:1284
      • C:\Users\Admin\AppData\Local\Temp\Emerge.exe
        "C:\Users\Admin\AppData\Local\Temp\Emerge.exe"
        2⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetThreadContext
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1716
        • C:\Users\Admin\AppData\Local\Temp\Emerge.exe
          "C:\Users\Admin\AppData\Local\Temp\Emerge.exe"
          3⤵
          • UAC bypass
          • Windows security bypass
          • Executes dropped EXE
          • Windows security modification
          • Checks whether UAC is enabled
          • Suspicious use of SetThreadContext
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          • System policy modification
          PID:572
          • C:\Program Files (x86)\Internet Explorer\iexplore.exe
            C:\Users\Admin\AppData\Local\Temp\Emerge.exe
            4⤵
            • Adds policy Run key to start application
            • Adds Run key to start application
            • Suspicious use of AdjustPrivilegeToken
            • Suspicious use of SetWindowsHookEx
            PID:1116
    • C:\Windows\system32\taskeng.exe
      taskeng.exe {151789F2-3B0D-4B03-9C31-2C6CFE0C2854} S-1-5-21-3762437355-3468409815-1164039494-1000:TZEOUYSL\Admin:Interactive:[1]
      1⤵
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Windows\system32\reg.EXE
        C:\Windows\system32\reg.EXE add HKCU\Software\Microsoft\Windows\CurrentVersion\Run /v "Abidingness2" /f /t REG_SZ /d "C:\Users\Admin\AppData\Local\Temp\Emerge.exe"
        2⤵
        • Adds Run key to start application
        • Modifies registry key
        PID:1852

    Network

    MITRE ATT&CK Enterprise v6

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Emerge.exe

      Filesize

      724KB

      MD5

      c8d1b48fefc657e31e884d52d9389e6b

      SHA1

      cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c

      SHA256

      4c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319

      SHA512

      d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09

    • C:\Users\Admin\AppData\Local\Temp\Emerge.exe

      Filesize

      724KB

      MD5

      c8d1b48fefc657e31e884d52d9389e6b

      SHA1

      cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c

      SHA256

      4c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319

      SHA512

      d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09

    • C:\Users\Admin\AppData\Local\Temp\Emerge.exe

      Filesize

      724KB

      MD5

      c8d1b48fefc657e31e884d52d9389e6b

      SHA1

      cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c

      SHA256

      4c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319

      SHA512

      d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09

    • \Users\Admin\AppData\Local\Temp\Emerge.exe

      Filesize

      724KB

      MD5

      c8d1b48fefc657e31e884d52d9389e6b

      SHA1

      cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c

      SHA256

      4c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319

      SHA512

      d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09

    • \Users\Admin\AppData\Local\Temp\Emerge.exe

      Filesize

      724KB

      MD5

      c8d1b48fefc657e31e884d52d9389e6b

      SHA1

      cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c

      SHA256

      4c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319

      SHA512

      d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09

    • \Users\Admin\AppData\Local\Temp\Emerge.exe

      Filesize

      724KB

      MD5

      c8d1b48fefc657e31e884d52d9389e6b

      SHA1

      cf3da2ad535e05c3eaa6c34ef334b6eea08f2c3c

      SHA256

      4c986eec3ff23bf14f32cdf7b081e671c5bb79e020c17f6fdb0f0a07ba9a7319

      SHA512

      d7b3682dad57c0d679b25de1324bed4e20928a978130280db7347af481fc877e045b67e6d75331fcb2597665f54137a874f51c60f9f21cd83fa33f04fd24dd09

    • memory/572-81-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/572-80-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/572-73-0x00000000004010B8-mapping.dmp

    • memory/572-72-0x0000000000400000-0x000000000042C000-memory.dmp

      Filesize

      176KB

    • memory/988-59-0x0000000000000000-mapping.dmp

    • memory/1284-60-0x0000000000000000-mapping.dmp

    • memory/1716-63-0x0000000000000000-mapping.dmp

    • memory/1716-76-0x0000000077220000-0x00000000773C9000-memory.dmp

      Filesize

      1.7MB

    • memory/1716-78-0x0000000077400000-0x0000000077580000-memory.dmp

      Filesize

      1.5MB

    • memory/1852-68-0x0000000000000000-mapping.dmp

    • memory/1956-66-0x0000000077400000-0x0000000077580000-memory.dmp

      Filesize

      1.5MB

    • memory/1956-56-0x00000000756B1000-0x00000000756B3000-memory.dmp

      Filesize

      8KB

    • memory/1956-57-0x0000000077220000-0x00000000773C9000-memory.dmp

      Filesize

      1.7MB

    • memory/1956-58-0x0000000077400000-0x0000000077580000-memory.dmp

      Filesize

      1.5MB