Resubmissions

22/09/2023, 18:57

230922-xme3mabg82 10

22/09/2023, 18:42

230922-xch2jahf81 10

22/09/2023, 18:40

230922-xbbwtshf7z 10

22/09/2023, 18:36

230922-w8437shf7s 10

22/09/2023, 18:09

230922-wrfdhsbe98 10

Analysis

  • max time kernel
    56s
  • max time network
    83s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    22/09/2023, 18:40

General

  • Target

    DV.exe

  • Size

    5.4MB

  • MD5

    974cf9781ee4c391d8c78f68247e1b18

  • SHA1

    13fc489bc589af5ebb2524b5969ddb3c75ace905

  • SHA256

    6f63952d569d65352cadb59dc95665dc01a2ccead6f2a84f8d89a9ee041aebe4

  • SHA512

    80122ed3b11c053b6896cfe4320e4edfb16db3a2a8b1176daa3f1b0e4be00054d8139fc707047bcdc3426166ce9eb8f1a2da9a3de2ada0496c7c44510d6cc3ac

  • SSDEEP

    98304:5Ni77gLVLRv0kFWEu4f06A9u4f+38+BscmQI0vjkaYgucBg0i:5Ni77oVJ0kFWn4sWL3R7mQPuoE

Score
10/10

Malware Config

Signatures

  • Suspicious use of NtCreateUserProcessOtherParentProcess 6 IoCs
  • Drops file in Drivers directory 1 IoCs
  • Stops running service(s) 3 TTPs
  • Suspicious use of SetThreadContext 1 IoCs
  • Launches sc.exe 5 IoCs

    Sc.exe is a Windows utlilty to control services on the system.

  • Creates scheduled task(s) 1 TTPs 1 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 19 IoCs
  • Suspicious use of AdjustPrivilegeToken 10 IoCs
  • Suspicious use of WriteProcessMemory 45 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Windows\system32\lsass.exe
    C:\Windows\system32\lsass.exe
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:676
  • C:\Windows\system32\winlogon.exe
    winlogon.exe
    1⤵
      PID:612
      • C:\Windows\system32\dwm.exe
        "dwm.exe"
        2⤵
          PID:1012
      • C:\Windows\System32\svchost.exe
        C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s NcbService
        1⤵
          PID:1076
        • C:\Windows\system32\svchost.exe
          C:\Windows\system32\svchost.exe -k netsvcs -p -s Schedule
          1⤵
            PID:1136
          • C:\Windows\system32\svchost.exe
            C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s TimeBrokerSvc
            1⤵
              PID:1068
            • C:\Windows\System32\svchost.exe
              C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s EventLog
              1⤵
                PID:1240
              • C:\Windows\system32\svchost.exe
                C:\Windows\system32\svchost.exe -k netsvcs -p -s UserManager
                1⤵
                  PID:1368
                • C:\Windows\system32\svchost.exe
                  C:\Windows\system32\svchost.exe -k netsvcs -p -s ProfSvc
                  1⤵
                    PID:1224
                  • C:\Windows\system32\svchost.exe
                    C:\Windows\system32\svchost.exe -k LocalService -p -s EventSystem
                    1⤵
                      PID:1440
                    • C:\Windows\sysmon.exe
                      C:\Windows\sysmon.exe
                      1⤵
                        PID:2472
                      • C:\Windows\Explorer.EXE
                        C:\Windows\Explorer.EXE
                        1⤵
                          PID:3192
                          • C:\Users\Admin\AppData\Local\Temp\DV.exe
                            "C:\Users\Admin\AppData\Local\Temp\DV.exe"
                            2⤵
                            • Suspicious use of NtCreateUserProcessOtherParentProcess
                            • Drops file in Drivers directory
                            • Suspicious use of SetThreadContext
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of WriteProcessMemory
                            PID:4508
                          • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
                            C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe Add-MpPreference -ExclusionPath @($env:UserProfile, $env:ProgramFiles) -Force
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            PID:3428
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c sc stop UsoSvc & sc stop WaaSMedicSvc & sc stop wuauserv & sc stop bits & sc stop dosvc
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3716
                            • C:\Windows\System32\sc.exe
                              sc stop UsoSvc
                              3⤵
                              • Launches sc.exe
                              PID:3856
                            • C:\Windows\System32\sc.exe
                              sc stop WaaSMedicSvc
                              3⤵
                              • Launches sc.exe
                              PID:2120
                            • C:\Windows\System32\sc.exe
                              sc stop wuauserv
                              3⤵
                              • Launches sc.exe
                              PID:2176
                            • C:\Windows\System32\sc.exe
                              sc stop bits
                              3⤵
                              • Launches sc.exe
                              PID:3688
                            • C:\Windows\System32\sc.exe
                              sc stop dosvc
                              3⤵
                              • Launches sc.exe
                              PID:3360
                          • C:\Windows\System32\cmd.exe
                            C:\Windows\System32\cmd.exe /c powercfg /x -hibernate-timeout-ac 0 & powercfg /x -hibernate-timeout-dc 0 & powercfg /x -standby-timeout-ac 0 & powercfg /x -standby-timeout-dc 0
                            2⤵
                            • Suspicious use of WriteProcessMemory
                            PID:3596
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3748
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -hibernate-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:3932
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-ac 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2208
                            • C:\Windows\System32\powercfg.exe
                              powercfg /x -standby-timeout-dc 0
                              3⤵
                              • Suspicious use of AdjustPrivilegeToken
                              PID:2484
                          • C:\Windows\System32\dialer.exe
                            C:\Windows\System32\dialer.exe
                            2⤵
                            • Suspicious behavior: EnumeratesProcesses
                            • Suspicious use of AdjustPrivilegeToken
                            • Suspicious use of WriteProcessMemory
                            PID:440
                          • C:\Windows\System32\schtasks.exe
                            C:\Windows\System32\schtasks.exe /delete /f /tn "GoogleUpdateForcefully"
                            2⤵
                              PID:4684
                            • C:\Windows\System32\schtasks.exe
                              C:\Windows\System32\schtasks.exe /create /f /tn "GoogleUpdateForcefully" /xml "C:\Users\Admin\AppData\Local\Temp\qgpsiwwqbudw.xml"
                              2⤵
                              • Creates scheduled task(s)
                              PID:1248
                          • C:\Windows\System32\svchost.exe
                            C:\Windows\System32\svchost.exe -k LocalService -p -s netprofm
                            1⤵
                              PID:1744
                            • C:\Windows\System32\svchost.exe
                              C:\Windows\System32\svchost.exe -k NetworkService -p -s NlaSvc
                              1⤵
                                PID:1656
                              • C:\Windows\System32\svchost.exe
                                C:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s AudioEndpointBuilder
                                1⤵
                                  PID:1648
                                • C:\Windows\system32\svchost.exe
                                  C:\Windows\system32\svchost.exe -k netsvcs -p -s SENS
                                  1⤵
                                    PID:1580
                                  • C:\Windows\system32\svchost.exe
                                    C:\Windows\system32\svchost.exe -k LocalServiceNetworkRestricted -p -s Dhcp
                                    1⤵
                                      PID:1480
                                    • C:\Windows\System32\svchost.exe
                                      C:\Windows\System32\svchost.exe -k netsvcs -p -s Themes
                                      1⤵
                                        PID:1448
                                      • C:\Windows\system32\svchost.exe
                                        C:\Windows\system32\svchost.exe -k LocalService -p -s nsi
                                        1⤵
                                          PID:1384
                                        • C:\Windows\system32\svchost.exe
                                          C:\Windows\system32\svchost.exe -k LocalService -p -s DispBrokerDesktopSvc
                                          1⤵
                                            PID:1184
                                          • C:\Windows\System32\svchost.exe
                                            C:\Windows\System32\svchost.exe -k LocalServiceNetworkRestricted -p -s lmhosts
                                            1⤵
                                              PID:996
                                            • C:\Windows\system32\svchost.exe
                                              C:\Windows\system32\svchost.exe -k netsvcs -p -s gpsvc
                                              1⤵
                                                PID:408
                                              • C:\Windows\system32\svchost.exe
                                                C:\Windows\system32\svchost.exe -k DcomLaunch -p -s LSM
                                                1⤵
                                                  PID:952

                                                Network

                                                MITRE ATT&CK Enterprise v15

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Temp\__PSScriptPolicyTest_4dyxfkvi.exj.ps1

                                                  Filesize

                                                  60B

                                                  MD5

                                                  d17fe0a3f47be24a6453e9ef58c94641

                                                  SHA1

                                                  6ab83620379fc69f80c0242105ddffd7d98d5d9d

                                                  SHA256

                                                  96ad1146eb96877eab5942ae0736b82d8b5e2039a80d3d6932665c1a4c87dcf7

                                                  SHA512

                                                  5b592e58f26c264604f98f6aa12860758ce606d1c63220736cf0c779e4e18e3cec8706930a16c38b20161754d1017d1657d35258e58ca22b18f5b232880dec82

                                                • C:\Users\Admin\AppData\Local\Temp\qgpsiwwqbudw.xml

                                                  Filesize

                                                  1KB

                                                  MD5

                                                  84ee42fe9a79a7eb9c9f96ab678af294

                                                  SHA1

                                                  62406990bcda0de8354575147aa07161be1ab194

                                                  SHA256

                                                  1e806c8c561abb9100a544eca8894f0c9b98f0859d92b277b6b511125f5c7427

                                                  SHA512

                                                  78ca886963a281e1164d6baebc285f62724b2a160d060b3bec43b5e0df0c6a13b58b36339318993e1306e86360ed591f2d2ffdf4af3f46b0aceacf9cbee66710

                                                • memory/408-50-0x000001D47CF70000-0x000001D47CF9B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/408-46-0x000001D47CF70000-0x000001D47CF9B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/408-49-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/440-21-0x00007FFD62000000-0x00007FFD620BE000-memory.dmp

                                                  Filesize

                                                  760KB

                                                • memory/440-20-0x00007FFD63B90000-0x00007FFD63D85000-memory.dmp

                                                  Filesize

                                                  2.0MB

                                                • memory/612-29-0x0000015EFDDE0000-0x0000015EFDE0B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/612-26-0x0000015EFDDB0000-0x0000015EFDDD4000-memory.dmp

                                                  Filesize

                                                  144KB

                                                • memory/612-117-0x0000015EFDDE0000-0x0000015EFDE0B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/612-32-0x00007FFD63C2D000-0x00007FFD63C2E000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/676-35-0x00000173D0AC0000-0x00000173D0AEB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/676-30-0x00000173D0AC0000-0x00000173D0AEB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/676-40-0x00007FFD63C2D000-0x00007FFD63C2E000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/676-127-0x00000173D0AC0000-0x00000173D0AEB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/676-33-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/952-43-0x00000255AE1D0000-0x00000255AE1FB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/952-147-0x00000255AE1D0000-0x00000255AE1FB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/952-48-0x00007FFD63C2C000-0x00007FFD63C2D000-memory.dmp

                                                  Filesize

                                                  4KB

                                                • memory/952-37-0x00000255AE1D0000-0x00000255AE1FB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/952-41-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/996-57-0x000001870CF90000-0x000001870CFBB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/996-61-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1012-42-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1012-38-0x0000016B525A0000-0x0000016B525CB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1012-47-0x0000016B525A0000-0x0000016B525CB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1068-56-0x00000201E2370000-0x00000201E239B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1068-59-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1076-62-0x000002181A7A0000-0x000002181A7CB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1076-64-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1136-69-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1136-67-0x00000240F8510000-0x00000240F853B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1184-76-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1184-74-0x0000020720890000-0x00000207208BB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1224-80-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1224-78-0x0000016CB2680000-0x0000016CB26AB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1240-87-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1240-84-0x0000026340320000-0x000002634034B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1368-89-0x000001B0F3510000-0x000001B0F353B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1368-91-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1384-98-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1384-97-0x0000018816060000-0x000001881608B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1440-102-0x000001FD5DFA0000-0x000001FD5DFCB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1440-100-0x00007FFD23C10000-0x00007FFD23C20000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/1440-95-0x000001FD5DFA0000-0x000001FD5DFCB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1448-107-0x000002AF041D0000-0x000002AF041FB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1448-99-0x000002AF041D0000-0x000002AF041FB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1580-134-0x00000164FC370000-0x00000164FC39B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1648-142-0x000002090C940000-0x000002090C96B000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1656-150-0x000001E8C1290000-0x000001E8C12BB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/1744-137-0x00000186D9DA0000-0x00000186D9DCB000-memory.dmp

                                                  Filesize

                                                  172KB

                                                • memory/3428-17-0x00007FFD43CC0000-0x00007FFD44781000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/3428-12-0x00000111F22F0000-0x00000111F2300000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/3428-13-0x00000111F22F0000-0x00000111F2300000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/3428-14-0x00000111F22F0000-0x00000111F2300000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/3428-15-0x00000111F22F0000-0x00000111F2300000-memory.dmp

                                                  Filesize

                                                  64KB

                                                • memory/3428-11-0x00007FFD43CC0000-0x00007FFD44781000-memory.dmp

                                                  Filesize

                                                  10.8MB

                                                • memory/3428-1-0x00000111F1DC0000-0x00000111F1DE2000-memory.dmp

                                                  Filesize

                                                  136KB

                                                • memory/4508-25-0x00007FF628EB0000-0x00007FF629419000-memory.dmp

                                                  Filesize

                                                  5.4MB

                                                • memory/4508-0-0x00007FF628EB0000-0x00007FF629419000-memory.dmp

                                                  Filesize

                                                  5.4MB