Managed XDR
Group-IB MDP Report
Filename: c-windows-ae-0124-be.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 1 MB
SHA1: 385c3571a58cae627cab648f1ef616a0920902c3 SHA256: d1177bc7e7306ba35d28a5e3864eeddba7132ade550d17a36f58bde4fd4fb2de MD5: 3990fdb6573ee3a8a91490ed0591f689
Signatures
Initial Access
T1091 spreading_autoruninf: Creates an autorun.inf file
Execution
T1059.001 powershell_through_runspace: Executes powershell script without spawning powershell.exe process
Privilege Escalation
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1564.001 stealth_file: Creates hidden or system files
T1027.002 packer_polymorphic: Creates a modified copy of itself
T1036 system_filename: Created a file named as a common system file
T1070 stealth_window: A process created a hidden window
T1480 system_default_lang_id_present: Checks the system language
T1027.002 packer_vb: The executable file is packed using VB
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497 evasion_prefetch: Attempts to detect Sandbox by process run count
T1497 evasion_winlogon: Attempts to detect Sandbox by winlogon sessions
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Credential Access
T1003.002 opens_registry_hive_file: Attempts to open Windows registry hive file
T1552.002 opens_registry_hive_file: Attempts to open Windows registry hive file
T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery
T1135 server_share_info: Retrieves information about each shared resource on a server
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497 evasion_prefetch: Attempts to detect Sandbox by process run count
T1497 evasion_winlogon: Attempts to detect Sandbox by winlogon sessions
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
Lateral Movement
T1091 spreading_autoruninf: Creates an autorun.inf file
Impact
T1486 modifies_files2: Cryptolocker indicators detected (500 or more files are modified)
T1486 modifies_files: Cryptolocker indicators detected (renamed 50 or more files)
Other
yara_rules: Static rules
creates_exe: Creates executable files in the file system
creates_in_windows: Creates files in the Windows directory
suspicious_process: Spawns a suspicious process
executes_dropped_exe: Executes dropped exe files
unexpected_exception: Unexpected exception
no_graphical_activity: No graphic activity
create_rpc_bindings: Creates RPC connection
break_limit_exceeded: Warning: function calls limit has been exceeded
get_policy_info: Retrieves information about a Policy object
changes_ext_type: File extension changed from executable to non-executable or vice versa
writes_data: Writes big amount of data to disk
pe_overlay: PE file contains overlay
Managed XDR