Analysis

  • max time kernel
    195s
  • max time network
    190s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230221-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230221-enlocale:en-usos:windows10-2004-x64system
  • submitted
    01-04-2023 14:44

General

  • Target

    https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip

Score
6/10

Malware Config

Signatures

  • Adds Run key to start application 2 TTPs 2 IoCs
  • Enumerates connected drives 3 TTPs 22 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Writes to the Master Boot Record (MBR) 1 TTPs 1 IoCs

    Bootkits write to the MBR to gain persistence at a level below the operating system.

  • Checks processor information in registry 2 TTPs 8 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Modifies registry class 1 IoCs
  • NTFS ADS 1 IoCs
  • Runs regedit.exe 1 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 3 IoCs
  • Suspicious use of FindShellTrayWindow 15 IoCs
  • Suspicious use of SendNotifyMessage 12 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Program Files\Mozilla Firefox\firefox.exe
    "C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:3812
    • C:\Program Files\Mozilla Firefox\firefox.exe
      "C:\Program Files\Mozilla Firefox\firefox.exe" https://github.com/Endermanch/MalwareDatabase/raw/master/rogues/Antivirus%20Pro%202017.zip
      2⤵
      • Checks processor information in registry
      • Modifies registry class
      • NTFS ADS
      • Suspicious use of AdjustPrivilegeToken
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SendNotifyMessage
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:368
      • C:\Program Files\Mozilla Firefox\firefox.exe
        "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.0.1005555290\2027812643" -parentBuildID 20221007134813 -prefsHandle 1844 -prefMapHandle 1836 -prefsLen 20890 -prefMapSize 232675 -appDir "C:\Program Files\Mozilla Firefox\browser" - {877dbd9a-35fa-4133-bdc5-b3bd5561ae12} 368 "\\.\pipe\gecko-crash-server-pipe.368" 1924 129eca18958 gpu
        3⤵
          PID:4120
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.1.45598489\1420040847" -parentBuildID 20221007134813 -prefsHandle 2412 -prefMapHandle 2408 -prefsLen 21706 -prefMapSize 232675 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {ce8f1a39-4d7f-4d8f-84eb-49f6f1e9301e} 368 "\\.\pipe\gecko-crash-server-pipe.368" 2424 129dea75258 socket
          3⤵
          • Checks processor information in registry
          PID:2904
        • C:\Program Files\Mozilla Firefox\firefox.exe
          "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.2.1758957892\1615128812" -childID 1 -isForBrowser -prefsHandle 3024 -prefMapHandle 3004 -prefsLen 21854 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {a4ac93e1-4c3e-4669-ada6-126c5e205bfb} 368 "\\.\pipe\gecko-crash-server-pipe.368" 3196 129ef70da58 tab
          3⤵
            PID:2756
          • C:\Program Files\Mozilla Firefox\firefox.exe
            "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.3.175406876\106776785" -childID 2 -isForBrowser -prefsHandle 4064 -prefMapHandle 4060 -prefsLen 26519 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {5295be34-9deb-4c8a-a820-f7f4f3120737} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4076 129dea65858 tab
            3⤵
              PID:748
            • C:\Program Files\Mozilla Firefox\firefox.exe
              "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.4.828652102\1364795552" -childID 3 -isForBrowser -prefsHandle 4604 -prefMapHandle 4420 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {c77152b3-65bc-4663-af71-35643339f898} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4572 129ee212458 tab
              3⤵
                PID:4364
              • C:\Program Files\Mozilla Firefox\firefox.exe
                "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.6.1023979453\1941558358" -childID 5 -isForBrowser -prefsHandle 4748 -prefMapHandle 4744 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {6aefb056-6986-46dc-9b39-afc8c57e4fe6} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4804 129f1cef558 tab
                3⤵
                  PID:5036
                • C:\Program Files\Mozilla Firefox\firefox.exe
                  "C:\Program Files\Mozilla Firefox\firefox.exe" -contentproc --channel="368.5.1552394041\560952441" -childID 4 -isForBrowser -prefsHandle 4616 -prefMapHandle 4504 -prefsLen 26578 -prefMapSize 232675 -jsInitHandle 1472 -jsInitLen 246848 -a11yResourceId 64 -parentBuildID 20221007134813 -win32kLockedDown -appDir "C:\Program Files\Mozilla Firefox\browser" - {07e59506-d467-45a6-b1b4-8d47710b6b14} 368 "\\.\pipe\gecko-crash-server-pipe.368" 4196 129f1895558 tab
                  3⤵
                    PID:4312
              • C:\Windows\System32\rundll32.exe
                C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                1⤵
                  PID:2816
                • C:\Users\Admin\Desktop\Endermanch@AntivirusPro2017.exe
                  "C:\Users\Admin\Desktop\Endermanch@AntivirusPro2017.exe"
                  1⤵
                  • Adds Run key to start application
                  • Enumerates connected drives
                  • Writes to the Master Boot Record (MBR)
                  • Suspicious behavior: GetForegroundWindowSpam
                  • Suspicious use of FindShellTrayWindow
                  • Suspicious use of SendNotifyMessage
                  • Suspicious use of SetWindowsHookEx
                  PID:2840
                • C:\Windows\regedit.exe
                  "C:\Windows\regedit.exe"
                  1⤵
                  • Runs regedit.exe
                  • Suspicious behavior: GetForegroundWindowSpam
                  PID:4604

                Network

                MITRE ATT&CK Matrix ATT&CK v6

                Persistence

                Registry Run Keys / Startup Folder

                1
                T1060

                Bootkit

                1
                T1067

                Defense Evasion

                Modify Registry

                1
                T1112

                Discovery

                Query Registry

                3
                T1012

                Peripheral Device Discovery

                1
                T1120

                System Information Discovery

                2
                T1082

                Command and Control

                Web Service

                1
                T1102

                Replay Monitor

                Loading Replay Monitor...

                Downloads

                • C:\Users\Admin\AppData\Local\Mozilla\Firefox\Profiles\bozzcyfh.default-release\activity-stream.discovery_stream.json.tmp
                  Filesize

                  156KB

                  MD5

                  44b11c934414f5016babb9b3e72abba1

                  SHA1

                  7f0877708ba81422aac277829696a872f20d196e

                  SHA256

                  cc4b15f6d3babc6391d53a579d64d8bcd06acd028e7e3525c36d27ef6251b3ce

                  SHA512

                  93da5f3a2081ae60a7e77cc437e932d52f0091b7427474c72a4adf60d5f0bc70f6894a0271f4405d33790db9490ae0ae20dd361abd0cc4eaf288fb256e2bb3b5

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.js
                  Filesize

                  6KB

                  MD5

                  aacc32b09af415499a5276feb8bd5de3

                  SHA1

                  94357a3f9feb014c173f79e6db95e7e4a0ecee78

                  SHA256

                  102d2e9670787dbf37abac2d77693d811e738a56a5b221dfb8083c09faa77497

                  SHA512

                  e17741bb34e530bbe5fcc858fda8103d4e1cc964ef55b8cc603d19b43b4f9fdf08fc3c6437084e4d3b451c9fcff99a474582d4b000c45d0758cc576764997080

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.js
                  Filesize

                  6KB

                  MD5

                  bf2bd387075624245bfd4bc331129a58

                  SHA1

                  310ba5117774c08e3717663c5a19bb56f17a88d5

                  SHA256

                  1035230e01a9766ee72b0e22c2f94555c67f71020c04f5e9745810f0ff56af80

                  SHA512

                  b10aad6e7a6b780f1deaad90ff23796de1c7053540844906bfb35572bc47e9dd769062528ff9fe9aa7d0a7854919f3a613038eb0b6c011062c1fd934ffb9a01d

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs-1.js
                  Filesize

                  6KB

                  MD5

                  ba5ba48da220f00d92cbd0f0fc45a09e

                  SHA1

                  cb22d1ce86528b6ff67df7838b784b9a80de70cd

                  SHA256

                  a12bdbfac8a72f9d99e052cb0931b210e8c5c2955239b0d37e578fdde207619a

                  SHA512

                  816291d50fe319843ba00bfc50180a28b365de4ce1ba52894ef7b5fad1032c1985cfba294b36c83a488ecff6db2181a73673ff566fc23af5c057498ebc864d43

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\prefs.js
                  Filesize

                  6KB

                  MD5

                  fcd5f37e5e4066f7cffe8eb106b6ce19

                  SHA1

                  b0a1c4d3d5c96271429fb09cb71055d177c13402

                  SHA256

                  38dbdb91f24f8e138803d71d0f7e4758fbb78e7f657208325fe30a501e225c67

                  SHA512

                  afdf7697bc784c3c85f30a8a1e4caa32459cf7f19c1ffacde04f62f089218ff1899ffe69fc465677d719546c8f91bea0d04807b13d58096f79aeba8eef0a0a15

                • C:\Users\Admin\AppData\Roaming\Mozilla\Firefox\Profiles\bozzcyfh.default-release\sessionstore.jsonlz4
                  Filesize

                  633B

                  MD5

                  29e685999e5e999a28f25f1cc7ea7c10

                  SHA1

                  d4b686fd73ba1d52f15e517dd792b8a60646f7a9

                  SHA256

                  fef1ab4f06a6fc16eef265b3a5ccbd073148f93f8ffb81391e254293535fa3ed

                  SHA512

                  d5a92f3680c901479bb64b64697a8213e262f1968bdd05db994a3f0b18ee10da6aa1e29fe39280e9e44371f6b8534b52a8842a68125a28f7bc27e4294497cbc8

                • C:\Users\Admin\Downloads\Antivirus Pro 2017.nXcY5l6E.zip.part
                  Filesize

                  794KB

                  MD5

                  ab1187f7c6ac5a5d9c45020c8b7492fe

                  SHA1

                  0d765ed785ac662ac13fb9428840911fb0cb3c8f

                  SHA256

                  8203f1de1fa5ab346580681f6a4c405930d66e391fc8d2da665ac515fd9c430a

                  SHA512

                  bbc6594001a2802ed654fe730211c75178b0910c2d1e657399de75a95e9ce28a87b38611e30642baeae6e110825599e182d40f8e940156607a40f4baa8aeddf2

                • memory/2840-380-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-384-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-377-0x0000000002D40000-0x0000000002D41000-memory.dmp
                  Filesize

                  4KB

                • memory/2840-378-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-379-0x0000000002D40000-0x0000000002D41000-memory.dmp
                  Filesize

                  4KB

                • memory/2840-375-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-381-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-382-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-383-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-376-0x0000000000AD0000-0x0000000000AD1000-memory.dmp
                  Filesize

                  4KB

                • memory/2840-386-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-387-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-388-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-396-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-397-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-399-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-400-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB

                • memory/2840-401-0x0000000000400000-0x0000000000A06000-memory.dmp
                  Filesize

                  6.0MB