Resubmissions

14-11-2022 23:13

221114-27l4wsea95 10

29-05-2020 11:41

200529-zk6e3261b2 6

Analysis

  • max time kernel
    284s
  • max time network
    272s
  • platform
    windows7_x64
  • resource
    win7v200430
  • submitted
    29-05-2020 11:41

General

  • Target

    UnluckyWare.exe

  • Size

    228KB

  • MD5

    d7924023e6cb8826e6db9c1bb917ee4e

  • SHA1

    d3727664988db585b9d632d2888963019b5e6e11

  • SHA256

    a9c4d78cd5e550155bf8cc080f30d632a15155a6dd55b1d5991b7d40809ce336

  • SHA512

    249102437da4a1a361b082b1683f4a69f7ee48ec7e423d2e0551440b61cbbd9f86ce2bd9b93507f7ffa4d268fb0f8d898870162eeb5eea458db67b50b3091519

Malware Config

Signatures

  • Modifies control panel 2 IoCs
  • Sets desktop wallpaper using registry 2 TTPs 1 IoCs
  • Adds Run entry to start application 2 TTPs 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 5 IoCs
  • Drops file in Windows directory 1 IoCs
  • Modifies system certificate store 2 TTPs 2 IoCs
  • Drops desktop.ini file(s) 45 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\UnluckyWare.exe
    "C:\Users\Admin\AppData\Local\Temp\UnluckyWare.exe"
    1⤵
    • Modifies control panel
    • Sets desktop wallpaper using registry
    • Adds Run entry to start application
    • Suspicious use of AdjustPrivilegeToken
    • Drops file in Windows directory
    • Modifies system certificate store
    • Drops desktop.ini file(s)
    PID:316
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1828
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x4ec
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:692

    Network

    MITRE ATT&CK Matrix ATT&CK v6

    Persistence

    Registry Run Keys / Startup Folder

    1
    T1060

    Defense Evasion

    Modify Registry

    3
    T1112

    Install Root Certificate

    1
    T1130

    Impact

    Defacement

    1
    T1491

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • memory/316-1-0x0000000000000000-0x0000000000000000-disk.dmp