Managed XDR
Group-IB MDP Report
File info
Filename: vtdl_qxtusrb0
File Type: SMTP mail, ASCII text, with CRLF line terminators
File Size: 971.7 KB
Env info
win7/x86 en
Hashes
SHA1: a5198e3e7f568e628a646d295de63830cc20bae4
SHA256: f0729b18a7a5348f8eb648c59a52951e48b7b2464b10e6f46b50291acd9dc1e4
MD5: 0d45a5873cb948d9ce495b6df1d4c74e
Malwares
Koadic
Signatures
Execution
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1106 susp_callbacks: Suspicious usage of some WinAPI with callbacks
T1047 has_wmi: Executes one or several WMI requests
Privilege Escalation
T1548.002 uac_bypass_mocking_dir: UAC bypass with the use of mocking directory
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1548.002 uac_bypass_mocking_dir: UAC bypass with the use of mocking directory
T1036 copies_utilities: Copies and runs system utility with different name
T1027.002 unnamed_memory_regions_contains_pe: One or several unnamed memory regions are PE files
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access
T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery
T1082 uses_windows_utilities: Uses Windows utilities for basic Windows functionality
T1083 crawls_directories: Opens a huge number of directories all over disk C: (possibly, searches for sensitive data)
T1518 locates_browser: Attempts to identify where browsers are installed
T1082 reads_csrss: Attempts to read csrss.exe memory
T1497.001 antivm_queries_computername: Retrieves the computer name
Collection
T1560.001 archive_via_utility: Detected archiving data via utility
Command and Control
T1105 lolbin_extrac32: Download or Copy file with Extrac32
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Other
yara_rules: Static rules
executes_dropped_exe: Executes dropped exe files
creates_exe: Creates executable files in the file system
creates_in_windows: Creates files in the Windows directory
dbatloader_behaviour: DBatLoader/ModiLoader behaviour
process_crashed: One of the processes has failed
no_graphical_activity: No graphic activity
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
suricata_alert: Malicious traffic detected
Managed XDR