Managed XDR
Group-IB MDP Report
File info
Filename: c-users-user-appdata-local-temp-vcaf3s33.5v5-34-1551-4119.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 599.6 KB
Env info
win7/x86 en
Hashes
SHA1: c15f77cc8d2cb9408550d257fa3d3e2e0a74b3b8
SHA256: 43c2da7c3c85c7658701c01e2fe8bda40c8efd701f0f89c2681313b15b206b20
MD5: 59f4049e4d0ce9f396872c9adafedd3c
Malwares
DarkWatchman
Signatures
Execution
T1059 network_wscript_downloader: Wscript.exe initiated network communication
T1059.001 suspicious_powershell: Creates suspicious powershell process
T1053.005 creates_tasks: Creates a delayed task using Task Scheduler
T1059 suspicious_process: Spawns a suspicious process
T1059.001 suspicious_process: Spawns a suspicious process
T1047 antivm_wmi: Uses WMI to detect virtual environment
T1047 has_wmi: Executes one or several WMI requests
T1059 wscript_info_discovery: Collects info about system with Wscript.Shell
T1559.001 com_exec: Execution of Win32_Process.Create COM Method
Persistence
T1053.005 creates_tasks: Creates a delayed task using Task Scheduler
T1197 rat_darkwatchman: DarkWatchman RAT indicators detected
Privilege Escalation
T1053.005 creates_tasks: Creates a delayed task using Task Scheduler
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1070.004 deletes_self: Moves to different location or removes the original executable file
T1197 rat_darkwatchman: DarkWatchman RAT indicators detected
T1036.001 invalid_authenticode: Digital signature of the executable file has failed the verification
T1497 debugs_self: Creates a process and debugs it
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1027.002 packer_entropy: Probably contains compressed or encrypted data
T1562.001 windows_defender_add_exclusion: Adds a path to Microsoft Defender exclusion list
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Discovery
T1497 debugs_self: Creates a process and debugs it
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1518.001 wmi_check_av: Uses WMI to check for installed antivirus software
T1082 has_wmi: Executes one or several WMI requests
T1518 locates_browser: Attempts to identify where browsers are installed
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1033 wscript_info_discovery: Collects info about system with Wscript.Shell
T1082 wscript_info_discovery: Collects info about system with Wscript.Shell
Command and Control
T1071 network_wscript_downloader: Wscript.exe initiated network communication
T1568.002 dga_domains: Connects to DGA domains
T1071.001 winhttp_https: Performs HTTP/HTTPS requests using WinHttp
Impact
T1490 vssadmin_delete_shadows: Attempt to delete volume shadow copies
Other
ransomware_shadowcopy: Removes volume shadow copies
creates_exe: Creates executable files in the file system
modifies_certs: Attempts to generate or modify system certificates
dns_without_resolve: DNS query without a response
no_graphical_activity: No graphic activity
has_pdb: This executable file has a PDB path
creates_suspended_process: Creates suspended process
break_limit_exceeded: Warning: function calls limit has been exceeded
message_box: Displays a message
get_policy_info: Retrieves information about a Policy object
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
pe_overlay: PE file contains overlay
Managed XDR