Managed XDR
Group-IB MDP Report
File info
Filename: manualclient_hide_wm7_2024_12_09_14_21_01.exe
File Type: PE32 executable (GUI) Intel 80386, for MS Windows
File Size: 12.2 MB
Env info
win7/x86 en
Hashes
SHA1: 6783f2a3f79f56a1d0ff16d7c70d69a9c758460b
SHA256: 7694dff3d7d477e15e6c93dbc659fc265d3a89ed0b29576dfbf2bae6b8ff2758
MD5: 505bd5fa552dffb2bd73506b562061ef
Signatures
Execution
T1059.003 suspicious_cmd_process: Cmd.exe without commandline launches a new process
T1569.002 persistence_service: Starts newly created service
T1047 antivm_wmi: Uses WMI to detect virtual environment
T1047 has_wmi: Executes one or several WMI requests
Persistence
T1183 persistence_autorun: Makes itself run automatically on Windows startup
T1543.003 creates_service: Creates a service, that will start automatically
T1543.003 persistence_services: Modifies Services registry key
T1574 dropper_dll: Creates DLL, which is then loaded into the process
T1574.011 persistence_services: Modifies Services registry key
Privilege Escalation
T1183 persistence_autorun: Makes itself run automatically on Windows startup
T1543.003 creates_service: Creates a service, that will start automatically
T1574 dropper_dll: Creates DLL, which is then loaded into the process
T1574.011 persistence_services: Modifies Services registry key
T1543.003 persistence_services: Modifies Services registry key
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
Defense Evasion
T1183 persistence_autorun: Makes itself run automatically on Windows startup
T1562.004 bypass_firewall: Changes local firewall configuration and policies
T1562.001 disables_security: Disables Windows Security options
T1562.004 firewall_add_rule: Modifies Firewall rules
T1222 takeown: May obtain file ownership using the takeown.exe tool
T1497.001 antivm_generic_services: Enumerates services, possibly for anti-virtualization
T1497.001 antisandbox_productid: Obtains Windows ProductID, probably to fingerprint a sandbox
T1497.001 antivm_firmware: Attempts to detect VM by firmware
T1497.001 antivm_generic_disk: Checks information on disk, possibly for anti-virtualization or checking privileges
T1574 dropper_dll: Creates DLL, which is then loaded into the process
T1574.011 persistence_services: Modifies Services registry key
T1222 icacls: May obtain or change Discretionary access control lists (DACLs)
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1497.001 antivm_network_adapters: Checks NIC addresses
T1070 stealth_window: A process created a hidden window
T1134 sets_privilegies_via_adjusttokenprivileges: Sets process privilege via AdjustTokenPrivileges
T1134 opens_thread_token: Opens the access token associated with a thread
T1134 opens_process_token: Opens the access token associated with a process
T1218.011 lolbin_setupapi_installhinfsection: Executes file via the InstallHinfSection function
T1480 system_default_lang_id_present: Checks the system language
T1497 antidbg_strings: Checks for malware analysis tools (specific strings found)
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497 checks_firmware: Attempts to read firmware information (potentially for evasion)
T1497.001 antivm_generic_msi: Checks installed MSI pakages, possibly for anti-virtualization
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1497.001 antivm_queries_computername: Retrieves the computer name
Credential Access
T1003.002 lolbin_reg: Uses Reg.exe to dump registry hives to retrieve password hashes
T1503 infostealer_browser: Retrieves personal information from local Internet browsers
T1552 infostealer_browser: Retrieves personal information from local Internet browsers
T1003.001 dumps_lsass: Dumps lsass.exe process (probably, to extract credentials)
T1555.003 cookie_files: Accesses cookie files
T1552 cookie_files: Accesses cookie files
Discovery
T1082 antivm_generic_disk: Checks information on disk, possibly for anti-virtualization or checking privileges
T1201 dumps_credentials: Saves registry hive (possibly, to extract credentials)
T1518.001 antiav_detectservice: Attempts to detect installed antiviruses by a certain service
T1033 sam_users_discovery: Enumerates users or groups in system with SAM API
T1497.001 antivm_generic_services: Enumerates services, possibly for anti-virtualization
T1497.001 antisandbox_productid: Obtains Windows ProductID, probably to fingerprint a sandbox
T1497.001 antivm_firmware: Attempts to detect VM by firmware
T1497.001 antivm_generic_disk: Checks information on disk, possibly for anti-virtualization or checking privileges
T1082 has_wmi: Executes one or several WMI requests
T1082 uses_windows_utilities: Uses Windows utilities for basic Windows functionality
T1007 has_wmi: Executes one or several WMI requests
T1057 process_interest: Enumerates processes
T1518 recon_programs: Collects information about installed programs
T1497.001 antivm_wmi: Uses WMI to detect virtual environment
T1497.001 antivm_disk_size: Checks the amount of free disk space
T1497.003 antisandbox_sleep: The process attempted to slow down analysis
T1518 locates_browser: Attempts to identify where browsers are installed
T1497.001 antivm_network_adapters: Checks NIC addresses
T1082 reads_csrss: Attempts to read csrss.exe memory
T1082 checks_firmware: Attempts to read firmware information (potentially for evasion)
T1082 fingerprint_to_file: Collects data about system and user and writes it to a text file
T1087.001 local_account_discovery: Enumerates local accounts
T1135 server_share_info: Retrieves information about each shared resource on a server
T1049 list_ts_rdp_sessions: Lists ts/rdp sessions
T1497 antidbg_strings: Checks for malware analysis tools (specific strings found)
T1497 evasion_diskenum: Sandbox evasion using enumeration of partitions
T1497 checks_firmware: Attempts to read firmware information (potentially for evasion)
T1497.001 antivm_generic_msi: Checks installed MSI pakages, possibly for anti-virtualization
T1497.001 antisandbox_script_timer: Detected script timer window (indicative of sleep style evasion)
T1497.001 antivm_queries_computername: Retrieves the computer name
Other
executes_dropped_exe: Executes dropped exe files
creates_in_windows: Creates files in the Windows directory
modifies_certs: Attempts to generate or modify system certificates
runs_utility_without_cmdline: Runs system utility without arguments (non-typical usage)
network_bind: Starts servers listening at 0.0.0.0:8150, None
creates_exe: Creates executable files in the file system
non_quadratic_icon: Icon is not square
codepage: Checks the system code page
unsigned_driver_drop: Sample is not signed and drops a device driver
driver_load: Loads a driver
no_graphical_activity: No graphic activity
create_rpc_bindings: Creates RPC connection
has_pdb: This executable file has a PDB path
creates_suspended_process: Creates suspended process
get_policy_info: Retrieves information about a Policy object
creates_in_programdata: Creates files in the ProgramData directory
test_check_service: Starts services
checktokenmembership: Checks user token with CheckTokenMembership call
pe_overlay: PE file contains overlay
open_winlogon_process: Trying to open winlogon process
Managed XDR