Analysis
-
max time kernel
150s -
max time network
145s -
platform
windows7_x64 -
resource
win7v20201028 -
submitted
06-11-2020 11:44
Static task
static1
Behavioral task
behavioral1
Sample
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe
Resource
win7v20201028
Behavioral task
behavioral2
Sample
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe
Resource
win10v20201028
General
-
Target
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe
-
Size
3.9MB
-
MD5
f779b9615b86f9dded7f6de1e5c3178c
-
SHA1
932bb2bb8ee87f26726f0cfd01113fbe65936271
-
SHA256
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d
-
SHA512
710b974627772a4fbf600fb0417690bbc4b956d4d25debae2748f23be473ce17f5356df9f37d17a3b65bcfd462f3bb8377d21af001f9f5e619ff01a2cfcbf500
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
Processes:
Soundcrd.exeSoundcrd.exeSoundcrd.exepid process 1676 Soundcrd.exe 308 Soundcrd.exe 412 Soundcrd.exe -
Processes:
yara_rule upx \Users\Admin\AppData\Roaming\Soundcrd.exe upx \Users\Admin\AppData\Roaming\Soundcrd.exe upx \Users\Admin\AppData\Roaming\Soundcrd.exe upx \Users\Admin\AppData\Roaming\Soundcrd.exe upx \Users\Admin\AppData\Roaming\Soundcrd.exe upx C:\Users\Admin\AppData\Roaming\Soundcrd.exe upx C:\Users\Admin\AppData\Roaming\Soundcrd.exe upx behavioral1/memory/308-15-0x0000000000400000-0x00000000004B5000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Soundcrd.exe upx behavioral1/memory/308-18-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/412-19-0x0000000000400000-0x0000000000409000-memory.dmp upx behavioral1/memory/308-21-0x0000000000400000-0x00000000004B5000-memory.dmp upx behavioral1/memory/412-23-0x0000000000400000-0x0000000000409000-memory.dmp upx C:\Users\Admin\AppData\Roaming\Soundcrd.exe upx behavioral1/memory/412-24-0x0000000000400000-0x0000000000409000-memory.dmp upx -
Checks BIOS information in registry 2 TTPs 1 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
Soundcrd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosDate Soundcrd.exe -
Loads dropped DLL 5 IoCs
Processes:
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exepid process 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe -
Adds Run key to start application 2 TTPs 2 IoCs
Processes:
reg.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run reg.exe Set value (str) \REGISTRY\USER\S-1-5-21-3825035466-2522850611-591511364-1000\Software\Microsoft\Windows\CurrentVersion\Run\Mcrosoftt = "C:\\Users\\Admin\\AppData\\Roaming\\Soundcrd.exe" reg.exe -
Suspicious use of SetThreadContext 2 IoCs
Processes:
Soundcrd.exedescription pid process target process PID 1676 set thread context of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 set thread context of 412 1676 Soundcrd.exe Soundcrd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Checks processor information in registry 2 TTPs 4 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
Soundcrd.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0 Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\Identifier Soundcrd.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\VendorIdentifier Soundcrd.exe -
Enumerates system info in registry 2 TTPs 1 IoCs
Processes:
Soundcrd.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\Identifier Soundcrd.exe -
Suspicious use of AdjustPrivilegeToken 24 IoCs
Processes:
Soundcrd.exeSoundcrd.exedescription pid process Token: SeIncreaseQuotaPrivilege 308 Soundcrd.exe Token: SeSecurityPrivilege 308 Soundcrd.exe Token: SeTakeOwnershipPrivilege 308 Soundcrd.exe Token: SeLoadDriverPrivilege 308 Soundcrd.exe Token: SeSystemProfilePrivilege 308 Soundcrd.exe Token: SeSystemtimePrivilege 308 Soundcrd.exe Token: SeProfSingleProcessPrivilege 308 Soundcrd.exe Token: SeIncBasePriorityPrivilege 308 Soundcrd.exe Token: SeCreatePagefilePrivilege 308 Soundcrd.exe Token: SeBackupPrivilege 308 Soundcrd.exe Token: SeRestorePrivilege 308 Soundcrd.exe Token: SeShutdownPrivilege 308 Soundcrd.exe Token: SeDebugPrivilege 308 Soundcrd.exe Token: SeSystemEnvironmentPrivilege 308 Soundcrd.exe Token: SeChangeNotifyPrivilege 308 Soundcrd.exe Token: SeRemoteShutdownPrivilege 308 Soundcrd.exe Token: SeUndockPrivilege 308 Soundcrd.exe Token: SeManageVolumePrivilege 308 Soundcrd.exe Token: SeImpersonatePrivilege 308 Soundcrd.exe Token: SeCreateGlobalPrivilege 308 Soundcrd.exe Token: 33 308 Soundcrd.exe Token: 34 308 Soundcrd.exe Token: 35 308 Soundcrd.exe Token: SeDebugPrivilege 412 Soundcrd.exe -
Suspicious use of SetWindowsHookEx 3 IoCs
Processes:
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exeSoundcrd.exeSoundcrd.exepid process 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe 1676 Soundcrd.exe 412 Soundcrd.exe -
Suspicious use of WriteProcessMemory 30 IoCs
Processes:
cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.execmd.exeSoundcrd.exedescription pid process target process PID 1924 wrote to memory of 1588 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe cmd.exe PID 1924 wrote to memory of 1588 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe cmd.exe PID 1924 wrote to memory of 1588 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe cmd.exe PID 1924 wrote to memory of 1588 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe cmd.exe PID 1588 wrote to memory of 1740 1588 cmd.exe reg.exe PID 1588 wrote to memory of 1740 1588 cmd.exe reg.exe PID 1588 wrote to memory of 1740 1588 cmd.exe reg.exe PID 1588 wrote to memory of 1740 1588 cmd.exe reg.exe PID 1924 wrote to memory of 1676 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe Soundcrd.exe PID 1924 wrote to memory of 1676 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe Soundcrd.exe PID 1924 wrote to memory of 1676 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe Soundcrd.exe PID 1924 wrote to memory of 1676 1924 cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 308 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe PID 1676 wrote to memory of 412 1676 Soundcrd.exe Soundcrd.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe"C:\Users\Admin\AppData\Local\Temp\cc82575926b314176e0b3ef9926d7a332f1c4de6adac1d9d26677206f457557d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\OBUeR.bat" "2⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\reg.exeREG ADD "HKCU\Software\Microsoft\Windows\CurrentVersion\Run" /v "Mcrosoftt" /t REG_SZ /d "C:\Users\Admin\AppData\Roaming\Soundcrd.exe" /f3⤵
- Adds Run key to start application
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exe"C:\Users\Admin\AppData\Roaming\Soundcrd.exe"2⤵
- Executes dropped EXE
- Suspicious use of SetThreadContext
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeC:\Users\Admin\AppData\Roaming\Soundcrd.exe3⤵
- Executes dropped EXE
- Checks BIOS information in registry
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious use of AdjustPrivilegeToken
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeC:\Users\Admin\AppData\Roaming\Soundcrd.exe3⤵
- Executes dropped EXE
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of SetWindowsHookEx
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\OBUeR.batMD5
173bcce4810d4901872d0ef4f0bfea4e
SHA1561b03fdfe68b6419fddf57f32e1aab9a6126a2f
SHA25610ea37eceabbe80fe9814280b66b957636951dbeeed18a9b4d50a1d24a6f1d1d
SHA5122401e0a5e3f7bf590a0767449da2249d09717e8c1cb71a7475e81d9615580001cfc38705cd1a5b4edc33f7df043bf195e28e4a5442a32bc879dffc6473bd545e
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
C:\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
\Users\Admin\AppData\Roaming\Soundcrd.exeMD5
deed7415c8e748f5c86c1f3eb6bcc642
SHA1f057bbc36d6edf9064e2e040826fee4b0b81d74c
SHA2562bff6693c6f373f9ae94714de03ea3617de7f264f33327dfa2702686b732e509
SHA51244e2242dfcfdf05142130c95ca45b00db362b8f8bef73271cdbb2c60115966db094f68cb31401ea38d9c1bba836ad6c975ad3964c72f64688a22aea123bceb39
-
memory/308-18-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/308-15-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/308-16-0x00000000004B3310-mapping.dmp
-
memory/308-21-0x0000000000400000-0x00000000004B5000-memory.dmpFilesize
724KB
-
memory/412-19-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/412-20-0x0000000000407450-mapping.dmp
-
memory/412-23-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/412-24-0x0000000000400000-0x0000000000409000-memory.dmpFilesize
36KB
-
memory/1588-2-0x0000000000000000-mapping.dmp
-
memory/1676-10-0x0000000000000000-mapping.dmp
-
memory/1740-4-0x0000000000000000-mapping.dmp