Resubmissions

04/12/2020, 17:06

201204-4hs2zp9xwe 8

Analysis

  • max time kernel
    125s
  • max time network
    131s
  • platform
    windows7_x64
  • resource
    win7v20201028
  • submitted
    04/12/2020, 17:06

General

  • Target

    SurfsharkSetup (5).exe

  • Size

    25.2MB

  • MD5

    20ee42699b52682eec596dfe400fbae6

  • SHA1

    41353e3a82c4baa226210e9325ee6b6b0ef7bf6b

  • SHA256

    35ee2cbb9e2b8c9527f93d1653f3dfc096b9b2bd7aa8170cf0e61df3e8a205a7

  • SHA512

    502a9f77396554d5d2c59661e00037c72666bc4df9f318c5e397c798f8ba63325993d7f8f4beaa647101f904d431204fd45ce9a8f2ed9b46efeeb5a3c5d29f48

Score
7/10

Malware Config

Signatures

  • Loads dropped DLL 5 IoCs
  • Enumerates connected drives 3 TTPs 48 IoCs

    Attempts to read the root path of hard drives other than the default C: drive.

  • Drops file in Windows directory 6 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of AdjustPrivilegeToken 64 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of WriteProcessMemory 26 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\SurfsharkSetup (5).exe
    "C:\Users\Admin\AppData\Local\Temp\SurfsharkSetup (5).exe"
    1⤵
    • Loads dropped DLL
    • Enumerates connected drives
    • Drops file in Windows directory
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of FindShellTrayWindow
    • Suspicious use of WriteProcessMemory
    PID:612
    • C:\Windows\SysWOW64\cmd.exe
      cmd /c ""C:\Users\Admin\AppData\Roaming\Surfshark\Surfshark 2.7.5000\install\check-KB3033929.bat" "
      2⤵
      • Suspicious use of WriteProcessMemory
      PID:1556
      • C:\Windows\SysWOW64\Wbem\WMIC.exe
        wmic qfe where "HotFixID = 'KB3033929'"
        3⤵
          PID:1200
        • C:\Windows\SysWOW64\find.exe
          Find "KB3033929"
          3⤵
            PID:1652
        • C:\Windows\SysWOW64\wusa.exe
          "C:\Windows\system32\wusa.exe" "C:\Users\Admin\AppData\Roaming\Surfshark\Surfshark\prerequisites\Windows 7 x64 security update\Windows6.1-KB3033929-x64.msu" /qn
          2⤵
          • Drops file in Windows directory
          • Suspicious behavior: GetForegroundWindowSpam
          PID:1844
      • C:\Windows\system32\msiexec.exe
        C:\Windows\system32\msiexec.exe /V
        1⤵
        • Enumerates connected drives
        • Suspicious use of AdjustPrivilegeToken
        • Suspicious use of WriteProcessMemory
        PID:268
        • C:\Windows\syswow64\MsiExec.exe
          C:\Windows\syswow64\MsiExec.exe -Embedding AD89B1A7E19EA717152229C2F1D0A433 C
          2⤵
          • Loads dropped DLL
          PID:956

      Network

      MITRE ATT&CK Enterprise v6

      Replay Monitor

      Loading Replay Monitor...

      Downloads

      • memory/612-18-0x0000000003AE0000-0x0000000003AE4000-memory.dmp

        Filesize

        16KB

      • memory/612-25-0x00000000039B0000-0x00000000039B6000-memory.dmp

        Filesize

        24KB

      • memory/612-9-0x0000000004700000-0x0000000004704000-memory.dmp

        Filesize

        16KB

      • memory/612-8-0x0000000004700000-0x0000000004704000-memory.dmp

        Filesize

        16KB

      • memory/612-7-0x0000000004700000-0x0000000004704000-memory.dmp

        Filesize

        16KB

      • memory/612-6-0x0000000004700000-0x0000000004704000-memory.dmp

        Filesize

        16KB

      • memory/612-10-0x0000000004700000-0x0000000004704000-memory.dmp

        Filesize

        16KB

      • memory/612-5-0x0000000004AF0000-0x0000000004AF4000-memory.dmp

        Filesize

        16KB

      • memory/612-12-0x0000000005500000-0x0000000005504000-memory.dmp

        Filesize

        16KB

      • memory/612-11-0x0000000003AE0000-0x0000000003AE4000-memory.dmp

        Filesize

        16KB

      • memory/612-4-0x00000000039B0000-0x00000000039B4000-memory.dmp

        Filesize

        16KB

      • memory/1632-26-0x000007FEF7E30000-0x000007FEF80AA000-memory.dmp

        Filesize

        2.5MB