Analysis

  • max time kernel
    140s
  • max time network
    150s
  • platform
    windows10_x64
  • resource
    win10v20201028
  • submitted
    20-01-2021 16:13

General

  • Target

    iym.exe

  • Size

    20KB

  • MD5

    9d1c8d505aed4eb37bd5530a0b5b3b10

  • SHA1

    8727180dafb631c287957dedbcc4f989fb0a5825

  • SHA256

    1730e8fd738a26adbe3f0b31192adf6d4cc175f021b2d06e6278e36a43efef40

  • SHA512

    0a1776064a7a82a53881036ed2b3ab9a30f0c842c826543202cbf6399cb10f6ca2544e95672e87ab59c84d5778544aa89dfaa802ab843aa57bf6bcbeb4f27bea

Malware Config

Signatures

  • Modifies WinLogon for persistence 2 TTPs 1 IoCs
  • Turns off Windows Defender SpyNet reporting 2 TTPs
  • Windows security bypass 2 TTPs
  • Looks for VirtualBox Guest Additions in registry 2 TTPs
  • Looks for VMWare Tools registry key 2 TTPs
  • Checks BIOS information in registry 2 TTPs 2 IoCs

    BIOS information is often read in order to detect sandboxing environments.

  • Drops startup file 2 IoCs
  • Windows security modification 2 TTPs 11 IoCs
  • Adds Run key to start application 2 TTPs 2 IoCs
  • Legitimate hosting services abused for malware hosting/C2 1 TTPs
  • Maps connected drives based on registry 3 TTPs 2 IoCs

    Disk information is often read in order to detect sandboxing environments.

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.

  • Suspicious use of NtSetInformationThreadHideFromDebugger 15 IoCs
  • Suspicious use of SetThreadContext 4 IoCs
  • Suspicious behavior: EnumeratesProcesses 15 IoCs
  • Suspicious use of AdjustPrivilegeToken 6 IoCs
  • Suspicious use of WriteProcessMemory 44 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\iym.exe
    "C:\Users\Admin\AppData\Local\Temp\iym.exe"
    1⤵
    • Modifies WinLogon for persistence
    • Checks BIOS information in registry
    • Drops startup file
    • Windows security modification
    • Adds Run key to start application
    • Maps connected drives based on registry
    • Suspicious use of NtSetInformationThreadHideFromDebugger
    • Suspicious use of SetThreadContext
    • Suspicious behavior: EnumeratesProcesses
    • Suspicious use of AdjustPrivilegeToken
    • Suspicious use of WriteProcessMemory
    PID:4768
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iym.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:704
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iym.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1128
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\iym.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1316
    • C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe
      "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\Admin\AppData\Local\Temp\iym.exe" -Force
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:1844
    • C:\Users\Admin\AppData\Local\Temp\iym.exe
      "C:\Users\Admin\AppData\Local\Temp\iym.exe"
      2⤵
      • Suspicious behavior: EnumeratesProcesses
      • Suspicious use of AdjustPrivilegeToken
      PID:3964
    • C:\Users\Admin\AppData\Local\Temp\iym.exe
      "C:\Users\Admin\AppData\Local\Temp\iym.exe"
      2⤵
        PID:4448
      • C:\Users\Admin\AppData\Local\Temp\iym.exe
        "C:\Users\Admin\AppData\Local\Temp\iym.exe"
        2⤵
          PID:4528
        • C:\Users\Admin\AppData\Local\Temp\iym.exe
          "C:\Users\Admin\AppData\Local\Temp\iym.exe"
          2⤵
            PID:4580

        Network

        MITRE ATT&CK Enterprise v6

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Microsoft\CLR_v4.0_32\UsageLogs\powershell.exe.log
          MD5

          db01a2c1c7e70b2b038edf8ad5ad9826

          SHA1

          540217c647a73bad8d8a79e3a0f3998b5abd199b

          SHA256

          413da361d77055dae7007f82b58b366c8783aa72e0b8fbe41519b940c253b38d

          SHA512

          c76ff57fcee5cdf9fdf3116d4e1dc0cf106867bf19ab474b763e242acf5dca9a7509cb837c35e130c3e056636b4e8a4e135512a978bcd3dd641e20f5bf76c3d6

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          6256bab40e901b897018ffa79e810f22

          SHA1

          200a92db7c07fcb8ead26ad8811ccd1eb8aff764

          SHA256

          c06434b99fd8bb9e5eea39dbdf9fc7b50c7769889b83081e8b631504e466e5e6

          SHA512

          acde7b895b122986621d1feadb840960cd27f68fb7af6484caab563457467361e171b9887aed726d18480fba0cc63792e3b73a745e40450d1fdded4efb14e888

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          a728ab68af196d4a4c46b9bc78e539a8

          SHA1

          70c763e370e2e9735e50ed4b7c7cc4c342ee0abe

          SHA256

          576cff6271b29d4fc711bb3ccbb65a213440408cfbdda67b610555d30f5de7aa

          SHA512

          cb5d5336e77d061327e875807e043485f42ec9ab24837a14a9d8774605f7bc29946f17340be17cde229f9956c8e5fcfceaa9a7484cc7879be0b9336864404387

        • C:\Users\Admin\AppData\Local\Microsoft\Windows\PowerShell\StartupProfileData-NonInteractive
          MD5

          a728ab68af196d4a4c46b9bc78e539a8

          SHA1

          70c763e370e2e9735e50ed4b7c7cc4c342ee0abe

          SHA256

          576cff6271b29d4fc711bb3ccbb65a213440408cfbdda67b610555d30f5de7aa

          SHA512

          cb5d5336e77d061327e875807e043485f42ec9ab24837a14a9d8774605f7bc29946f17340be17cde229f9956c8e5fcfceaa9a7484cc7879be0b9336864404387

        • memory/704-119-0x000000007F0B0000-0x000000007F0B1000-memory.dmp
          Filesize

          4KB

        • memory/704-86-0x0000000008F40000-0x0000000008F73000-memory.dmp
          Filesize

          204KB

        • memory/704-134-0x0000000006BF3000-0x0000000006BF4000-memory.dmp
          Filesize

          4KB

        • memory/704-52-0x0000000006BF2000-0x0000000006BF3000-memory.dmp
          Filesize

          4KB

        • memory/704-126-0x00000000094A0000-0x00000000094A1000-memory.dmp
          Filesize

          4KB

        • memory/704-12-0x0000000000000000-mapping.dmp
        • memory/704-144-0x0000000009400000-0x0000000009401000-memory.dmp
          Filesize

          4KB

        • memory/704-43-0x0000000006BF0000-0x0000000006BF1000-memory.dmp
          Filesize

          4KB

        • memory/704-70-0x0000000007210000-0x0000000007211000-memory.dmp
          Filesize

          4KB

        • memory/704-73-0x00000000083B0000-0x00000000083B1000-memory.dmp
          Filesize

          4KB

        • memory/704-16-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/704-33-0x0000000007AD0000-0x0000000007AD1000-memory.dmp
          Filesize

          4KB

        • memory/704-19-0x0000000001240000-0x0000000001241000-memory.dmp
          Filesize

          4KB

        • memory/704-21-0x0000000007230000-0x0000000007231000-memory.dmp
          Filesize

          4KB

        • memory/704-78-0x0000000008230000-0x0000000008231000-memory.dmp
          Filesize

          4KB

        • memory/704-28-0x0000000006FE0000-0x0000000006FE1000-memory.dmp
          Filesize

          4KB

        • memory/704-29-0x0000000007180000-0x0000000007181000-memory.dmp
          Filesize

          4KB

        • memory/1128-13-0x0000000000000000-mapping.dmp
        • memory/1128-18-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/1128-61-0x0000000006DF2000-0x0000000006DF3000-memory.dmp
          Filesize

          4KB

        • memory/1128-123-0x000000007F310000-0x000000007F311000-memory.dmp
          Filesize

          4KB

        • memory/1128-47-0x0000000006DF0000-0x0000000006DF1000-memory.dmp
          Filesize

          4KB

        • memory/1128-135-0x0000000006DF3000-0x0000000006DF4000-memory.dmp
          Filesize

          4KB

        • memory/1316-63-0x0000000004C62000-0x0000000004C63000-memory.dmp
          Filesize

          4KB

        • memory/1316-132-0x0000000004C63000-0x0000000004C64000-memory.dmp
          Filesize

          4KB

        • memory/1316-14-0x0000000000000000-mapping.dmp
        • memory/1316-120-0x0000000009620000-0x0000000009621000-memory.dmp
          Filesize

          4KB

        • memory/1316-115-0x000000007E0E0000-0x000000007E0E1000-memory.dmp
          Filesize

          4KB

        • memory/1316-114-0x00000000087D0000-0x00000000087D1000-memory.dmp
          Filesize

          4KB

        • memory/1316-55-0x0000000004C60000-0x0000000004C61000-memory.dmp
          Filesize

          4KB

        • memory/1316-17-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/1316-87-0x00000000094F0000-0x0000000009523000-memory.dmp
          Filesize

          204KB

        • memory/1844-64-0x00000000073D0000-0x00000000073D1000-memory.dmp
          Filesize

          4KB

        • memory/1844-66-0x00000000073D2000-0x00000000073D3000-memory.dmp
          Filesize

          4KB

        • memory/1844-136-0x0000000009A20000-0x0000000009A21000-memory.dmp
          Filesize

          4KB

        • memory/1844-133-0x00000000073D3000-0x00000000073D4000-memory.dmp
          Filesize

          4KB

        • memory/1844-125-0x000000007EF50000-0x000000007EF51000-memory.dmp
          Filesize

          4KB

        • memory/1844-24-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/1844-15-0x0000000000000000-mapping.dmp
        • memory/3964-60-0x0000000005520000-0x0000000005521000-memory.dmp
          Filesize

          4KB

        • memory/3964-130-0x0000000005820000-0x0000000005821000-memory.dmp
          Filesize

          4KB

        • memory/3964-34-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/3964-32-0x00000000004374DE-mapping.dmp
        • memory/3964-31-0x0000000000400000-0x000000000043C000-memory.dmp
          Filesize

          240KB

        • memory/4448-40-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/4448-37-0x00000000004374DE-mapping.dmp
        • memory/4528-54-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/4528-48-0x00000000004374DE-mapping.dmp
        • memory/4768-11-0x00000000069E0000-0x00000000069E1000-memory.dmp
          Filesize

          4KB

        • memory/4768-2-0x0000000073150000-0x000000007383E000-memory.dmp
          Filesize

          6.9MB

        • memory/4768-10-0x0000000001400000-0x0000000001464000-memory.dmp
          Filesize

          400KB

        • memory/4768-9-0x0000000005550000-0x0000000005551000-memory.dmp
          Filesize

          4KB

        • memory/4768-68-0x0000000005FD0000-0x0000000005FD1000-memory.dmp
          Filesize

          4KB

        • memory/4768-8-0x0000000005680000-0x0000000005681000-memory.dmp
          Filesize

          4KB

        • memory/4768-7-0x00000000056B0000-0x00000000056B1000-memory.dmp
          Filesize

          4KB

        • memory/4768-6-0x0000000005570000-0x0000000005571000-memory.dmp
          Filesize

          4KB

        • memory/4768-5-0x0000000005980000-0x0000000005981000-memory.dmp
          Filesize

          4KB

        • memory/4768-3-0x0000000000D50000-0x0000000000D51000-memory.dmp
          Filesize

          4KB