Managed XDR
Group-IB MDP Report
File info
Filename: 3ywckxo-65831-08g8b966332734cfbe66b813c7f.txt
File Type: SMTP mail, ASCII text
File Size: 119.7 KB
Env info
w10/x86 en
Hashes
SHA1: a4ca423bb9da15d7a544b71c76459ca5fc73f68d
SHA256: f4fdbfefd1397d472c65efea4b6e085b316c0ba8679639aee477507be7c5d555
MD5: 83835cdb718011f09df9e14d0c5037bd
Signatures
Initial Access
T1192 html_urls: HTML-document downloads a file
Privilege Escalation
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1497.001 antivm_network_adapters: Checks NIC addresses
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Discovery
T1497.001 antivm_network_adapters: Checks NIC addresses
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Command and Control
T1102.003 cloud_filetransfer: Connects to cloud services of Filetransfer.io (potentially for malicious payload delivery)
T1071.001 network_cnc_http: Suspicious HTTP traffic
T1071.001 network_http: Performs HTTP requests
Other
yara_rules: Static rules
pe_in_bcryptdecrypt: PE found in BCryptDecrypt function
no_graphical_activity: No graphic activity
dotnet_suspicious_resources_names: Dotnet program has suspicious resources names
dotnet_import_unmanaged_code: Dotnet program statically imports unmanaged functions/modules
dotnet_obfuscated: Dotnet program is potentially obfuscated
get_policy_info: Retrieves information about a Policy object
checktokenmembership: Checks user token with CheckTokenMembership call
dotnet_suspicious_module_name: Dotnet program has suspicious module name
Managed XDR