Managed XDR
Group-IB MDP Report
File info
Filename: unknownspf.exe
File Type: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows
File Size: 430.5 KB
Env info
w10/x64 en
Hashes
SHA1: 1e17239bd83386a2a35fc27e60e1daf42ae01b1f
SHA256: d5a6d971e246e69799cc7c602255a23592418325c21f11b1fdf333f28374774d
MD5: 4d4063f71d89361dc62877e8dc8c8340
Signatures
Execution
T1059.003 executes_dropped_cmd: Executes dropped batch files
T1047 antivm_wmi: Uses WMI to detect virtual environment
T1047 has_wmi: Executes one or several WMI requests
T1059.003 suspicious_batch: Suspicious batch
Privilege Escalation
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1070.004 deletes_self: Moves to different location or removes the original executable file
T1562.001 disables_security: Disables Windows Security options
T1564.001 stealth_file: Creates hidden or system files
T1497.001 antisandbox_productid: Obtains Windows ProductID, probably to fingerprint a sandbox
T1027.002 packer_polymorphic: Creates a modified copy of itself
T1027.002 unnamed_memory_regions: Code was executed in unnamed regions
T1497 antidbg_query_process: Checks if the process is being debugged (ProcessDebugPort)
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1497.003 antisandbox_sleep_utilities: Uses Windows utilities for pausing the execution
T1497.001 antivm_network_adapters: Checks NIC addresses
T1070 stealth_window: A process created a hidden window
T1497.001 antivm_queries_computername: Retrieves the computer name
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Credential Access
T1003.001 dumps_lsass: Dumps lsass.exe process (probably, to extract credentials)
Discovery
T1497.001 antisandbox_productid: Obtains Windows ProductID, probably to fingerprint a sandbox
T1518.001 antiav_detectservice: Attempts to detect installed antiviruses by a certain service
T1057 pidbruteforce: Enumerates processes using PID Bruteforce
T1497 antidbg_query_process: Checks if the process is being debugged (ProcessDebugPort)
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1497.003 antisandbox_sleep_utilities: Uses Windows utilities for pausing the execution
T1082 has_wmi: Executes one or several WMI requests
T1497.001 antivm_network_adapters: Checks NIC addresses
T1518 locates_browser: Attempts to identify where browsers are installed
T1497.001 antivm_queries_computername: Retrieves the computer name
Exfiltration
T1022 encrypts_pc_info: Collects and encrypts information about the computer (possibly for exfiltration)
Impact
T1489 stops_service: Stops Windows services
T1489 net_stop: Stops services through the use of net stop
Other
yara_rules: Static rules
static_pe_anomaly: The PE file structure contains anomalies
ip_domains: Identifies an IP address using external resources
creates_exe: Creates executable files in the file system
executes_dropped_exe: Executes dropped exe files
create_rpc_bindings: Creates RPC connection
require_administrator: Requests administrator privileges
creates_suspended_process: Creates suspended process
dotnet_import_unmanaged_code: Dotnet program statically imports unmanaged functions/modules
break_limit_exceeded: Warning: function calls limit has been exceeded
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
pe_overlay: PE file contains overlay
open_winlogon_process: Trying to open winlogon process
suricata_alert: Malicious traffic detected
dotnet_downloader_possible_network_problem: Dotnet program possibly has network problem
Managed XDR